Industry blog

Posted: 23 Aug 2019
jcarpenter's picture

Employees enter login credentials and, once authenticated, gain secure access to valuable network resources and applications. However, requiring users to go through the authentication process only once is turning out to be a risk factor in itself. This process leaves organizations vulnerable to risk every time an employee steps away from their desk, clicks a link, shares a password, or...

Continue reading >>
Posted: 19 Aug 2019
rmegonigal's picture

While often used for identification purposes to cross an international border or to gain access to a device or a location, biometrics―such as fingerprints―have advanced to become an integral part of criminal and forensic investigations.

It is easy to take for granted that it has taken more than 100 years to develop the technology that makes the capturing of biometrics as...

Continue reading >>
Posted: 14 Aug 2019
jcarpenter's picture

The online hub for the modern workforce is the mobile phone—making reliable, frictionless security critical. Without it, text messages, location data, contacts and any account information stored on the phone is at risk for theft and misuse. Moreover, the broader universe of enterprise applications accessed through the mobile device can be imperiled.

...

Continue reading >>
Posted: 01 Aug 2019
jmacinnis's picture



“Success in creating AI would be the biggest event in human history. Unfortunately, it might also be the last, unless we learn how to avoid the risks.”

– Steven Hawking...

Continue reading >>
Posted: 30 Jul 2019
bdegonia's picture

Background checks. Governments, corporations, healthcare organizations and financial institutions require them as part of their hiring process. They help identify individuals who have criminal backgrounds and therefore are ineligible for employment. Background checks help organizations reduce their risk, comply with legal requirements, ensure public safety and provide customer assurance....

Continue reading >>
Posted: 30 Jul 2019
jcarpenter's picture

Biometric authentication is fast and convenient. Touch your phone and it is unlocked. Look through an iris scanner and enter a secure room. Speak into your phone for hands-free authentication. Governments, law enforcement, airports, and corporations use it. However, is biometric authentication that simple? Not really when you consider the policy issues, privacy concerns, and complexity of...

Continue reading >>
Posted: 09 Jul 2019
aletan's picture

The real value of security components

A huge number of people cross borders every hour, many of them by air. If you consult flight radar apps, where one can follow every airplane currently in the air, air traffic is sometimes so heavy that you are not even able to spot a patch of sky amongst flight paths. It is estimated by the International Aviation Trade Association (IATA) that...

Continue reading >>
Posted: 09 Jul 2019
jcarpenter's picture

Strong identity and access management (IAM) is vital to securing your business against cyber attacks, thwarting social engineering attempts and stopping hackers from stealing credentials. You need a solution that provides robust authentication and authorization, balanced with ease of use, to secure your sensitive data and systems.

...

Continue reading >>
Posted: 09 Jul 2019
nwahlander's picture

Smart Schools are Seeing the Benefits of Smart Cards

The ID norm used by students to access their dorms, buy food, or check out books from the library used to be magnetic stripe or barcode cards. Many schools have discovered that using these technologies, especially for door access, is fraught with security vulnerabilities and expensive to maintain over time. It’s becoming...

Continue reading >>
Posted: 27 Jun 2019
othiriondebriel's picture

Not surprisingly, as threat and fraud detection solutions become more sophisticated, malware and other threats continue to evolve. In the arms race between banks and criminals, the most advanced cybersecurity solutions are needed to reduce the risks of identity theft, compromised banking credentials and outright stealing from customer accounts. HID’s Risk Management Solution (RMS) offers the...

Continue reading >>

Pages