Industry blog

Posted: 13 Jan 2020
mchandarana's picture

When it comes to running an organization, lots of good things are optional: healthy snacks in the break room, monthly shared birthday parties, chairs with good lumbar support. But some things are anything but optional, and network security is one of them. With data privacy regulations, threats from hackers and unscrupulous competitors, and the simple need to protect your organization's assets...

Continue reading >>
Posted: 08 Jan 2020
jmacinnis's picture

The latest technology trends and best practices in advanced authentication have evolved way beyond passwords. The way that employees, customers, partners and others access systems and data is driving change in how IT cybersecurity professionals create strong, safe, protected environments. As businesses move to the mobile enterprise and customers conduct more of their business on-the-go, risk-...

Continue reading >>
Posted: 19 Dec 2019
harrehed's picture

We are proud to announce the availability of our HID Origo™ Developer Portal. The portal provides technology partners with the tools and support needed to build apps and API integrations that blend physical and digital employee experiences with technology.

"Our physical access cloud platform, HID Origo, was launched...

Continue reading >>
Posted: 02 Jan 2020
jandler's picture

Workplace violence is on the rise in the U.S., with hospital employees being common targets of assault and other attacks. These incidents often come from patients, but many are perpetrated by patient families and visitors. Managing these visitors to hospitals and other medical facilities can go a long way towards preventing workplace violence. In this article, we’ll explore the impact to...

Continue reading >>
Posted: 16 Dec 2019
ilowe's picture

The digital transformation of security is happening now. IoT, cloud, and mobile technologies are providing new solutions for our security challenges; they also add to the already very complex security landscape. New attack vectors, social engineering, and malicious technologies are rapidly increasing in sophistication and approach. How do we stay ahead of the curve, combining robust...

Continue reading >>
Posted: 26 Nov 2019
jcarpenter's picture

Most IT and cybersecurity professionals have at least occasional anxiety about when the next major virus, ransomware or swarm bot will hit. With the bulk of data breaches occurring at the network perimeter—as users get their emails and go online—user authentication software is a primary concern.

The fight against stolen credentials has led to the growing adoption of two-factor...

Continue reading >>
Posted: 20 Nov 2019
jmacinnis's picture

While we enjoy the business opportunities, productivity gains and user conveniences of our data-driven economy, we certainly do not enjoy the cost and devastation of having accounts hacked, clients’ data stolen or employees’ identities misused.

In the quest for data integrity and secure credential management, public-key infrastructure (PKI) has long proven its effectiveness as a key...

Continue reading >>
Posted: 14 Nov 2019's picture

State governments, municipalities and other local agencies can sometimes struggle with authenticating their citizens, particularly in an increasingly mobile world. Effective identity and access management is vital to protecting sensitive data but must be balanced against the...

Continue reading >>
Posted: 08 Nov 2019
othiriondebriel's picture

Business, customer and account security are critical for banks and other financial organizations. Banks are continually re-evaluating how they provide robust protection across all of their technology, and there’s been a recent shift in the approach. The ongoing move to cloud-based technologies means that banks are increasingly looking for Software as a Service (SaaS) solutions, and secure apps...

Continue reading >>
Posted: 29 Oct 2019
jmacinnis's picture

As a collaborative effort between the government and the cybersecurity industry, National Cybersecurity Awareness Month (NCSAM) is held every October. The educational month helps raise awareness of how businesses and individuals can protect themselves online. With criminals, hackers, and other bad actors continually developing how they attack and gain access to systems and data, we must...

Continue reading >>