Industry blog

Posted: 09 Jul 2019
aletan's picture

A huge number of people cross borders every hour, many of them by air. If you consult flight radar apps, where one can follow every airplane currently in the air, air traffic is sometimes so heavy that you are not even able to spot a patch of sky amongst flight paths. It is estimated by the International Aviation Trade Association (IATA) that the number of travelers will double in the next...

Continue reading >>
Posted: 09 Jul 2019
jcarpenter's picture

Strong identity and access management (IAM) is vital to securing your business against cyber attacks, thwarting social engineering attempts and stopping hackers from stealing credentials. You need a solution that provides robust authentication and authorization, balanced with ease of use, to secure your sensitive data and systems.

...

Continue reading >>
Posted: 09 Jul 2019
nwahlander's picture

Smart Schools are Seeing the Benefits of Smart Cards

The ID norm used by students to access their dorms, buy food, or check out books from the library used to be magnetic stripe or barcode cards. Many schools have discovered that using these technologies, especially for door access, is fraught with security vulnerabilities and expensive to maintain over time. It’s becoming...

Continue reading >>
Posted: 27 Jun 2019
othiriondebriel's picture

Not surprisingly, as threat and fraud detection solutions become more sophisticated, malware and other threats continue to evolve. In the arms race between banks and criminals, the most advanced cybersecurity solutions are needed to reduce the risks of identity theft, compromised banking credentials and outright stealing from customer accounts. HID’s Risk Management Solution (RMS) offers the...

Continue reading >>
Posted: 26 Jun 2019
jmacinnis's picture

Finding the right identity and access management (IAM) solution can be a challenge. With dozens of vendors and products in the marketplace, how do you pick the right one? The following is a guide to help you identify the unique needs, challenges and various factors in your organization to consider when selecting the perfect IAM solution and vendor to meet your security goals.

...

Continue reading >>
Posted: 20 Jun 2019
othiriondebriel's picture

If you’re a financial services organization doing business in New York State, then you need to be compliant with the New York Department of Financial Services (DFS) Cybersecurity Regulation, known as 23 NYCRR 500. All banks, financial institutions, and similar businesses must understand their responsibilities under 23 NYCRR 500, particularly for strong authentication and securing data.

... Continue reading >>
Posted: 25 Jun 2019
fjogandcoulomb's picture

Digital identity is more than a buzzword in the government business. It is almost reality. More than 10 pilot projects and a small number of live projects are currently running worldwide, mainly around digital driving licenses. But what do we mean when we talk about digital identity? Is it just a digitalized identity document that is accessible on a smart phone? This would not make it any...

Continue reading >>
Posted: 17 Jun 2019
fjogandcoulomb's picture

Today, a small number of citizens around the world are lucky enough to use digital IDs thanks to a handful of governments that have put these programs in place. For many others, digital ID is just around the corner. Nevertheless, the decision to go for a digital ID program implicates many decisions that a government must make during the process. An example of one such vital decision is where...

Continue reading >>
Posted: 06 Jun 2019
jcarpenter's picture

The simple combination of a user ID and password is no longer good enough to protect our most vulnerable information. Identity theft, data breaches, malware, and malicious actors mean that digital security must evolve to stay one step ahead of security threats.

Strong, reliable security in a modern government, non-profit, SMB, or enterprise environment isn’t just important today; it's...

Continue reading >>
Posted: 22 May 2019
ilowe's picture

What is it?

Wikipedia defines Augmented Reality (AR) as, “an interactive experience of a real-world environment where the objects that reside in the real-world are ‘augmented’ by computer-generated perceptual information, sometimes across multiple sensory modalities, including visual, auditory, haptic, somatosensory, and olfactory.”

More simply put, AR technology superimposes a...

Continue reading >>

Pages