Industry blog

Posted: 15 Apr 2019
ymassard@hidglobal.com's picture

Passwords remain a significant cybersecurity risk for organizations of all sizes.

With Password-related attacks on internet-facing applications as well as internal applications ranging from phishing, guessing weak passwords, password stuffing and keyloggers to rainbow tables, social engineering, and...

Continue reading >>
Posted: 12 Apr 2019
rmegonigal's picture

When employing biometrics, there is a balance between privacy and security. Government entities are entrusted with keeping their citizens safe from both external and internal threats and biometrics are a useful tool to meet this expectation. However, there is a risk that corrupt governments can use biometrics to monitor citizens on issues not directly related to security, thus violating their...

Continue reading >>
Posted: 11 Apr 2019
amalpani's picture

What is Intellectual Property?

An organization’s intellectual property (IP) ranges from information about a process or the secret sauce for a particular product to patents filed by employees or an organization’s client list. The World Intellectual Property Organization (WIPO) defines IP as creations of the mind such as inventions, literary or artistic works, designs, symbols, names...

Continue reading >>
Posted: 09 Apr 2019
jhinmon's picture

Today is Internet of Things (IoT) Day, which means it’s the perfect time to explore how this brave new world of smart devices has changed the way we do business—and how we think about security. For over a decade, the concept of IoT has been attracting buzz from tech enthusiasts, business leaders, and consumers alike. While internet-connected devices have been around for much longer (like the...

Continue reading >>
Posted: 22 Mar 2019
fjacquot's picture

When it comes to identity documents, the picture is the aspect most often forged. Why? Because photos most visibly connect documents to their rightful owners. Fortunately, there are many ways to secure the picture to make sure that the person captured on the document is in fact the person being presented for identification to the verifier.

...

Continue reading >>
Posted: 04 Mar 2019
SWarne's picture

Exciting new products and processes such as mobile and digital IDs, innovative visions of frictionless borders and improved traveler experiences are emerging in the identity market. Given the potential benefits to citizens and governments alike, it is impossible not to wonder why these products and processes face such slow adoption.

...

Continue reading >>
Posted: 04 Mar 2019
jmilan's picture

Mobile identity is one of the most popular topics in the identity business today. If we look at ongoing pilots all over the world, the most common use case we see is the mobile driver’s license. For many countries, a mobile driving license is often used as the primary identification document when there is no national identity card. But this view is a very limited one that does not take into...

Continue reading >>
Posted: 26 Feb 2019
ilowe's picture

The convergence of technology, innovation, new regulation and security risks are rapidly changing banking security ecosystems. Typically, IT security is the main focus for mitigating these risks. However, physical security also plays a major role in preventing security breaches and shoring up an institution's image. In speaking to our financial services customers, three access control...

Continue reading >>
Posted: 25 Jan 2019
othiriondebriel's picture

With the sophistication of hacking attacks, it becomes more and more difficult for banks to guarantee their customers' data will not be compromised. In October 2018, an undisclosed number of HSBC’s online retail accounts in the US were hacked. The technique used by the hackers is called “credential stuffing,” which means personal details were harvested from elsewhere, and then utilized to gain...

Continue reading >>
Posted: 18 Dec 2018
amalpani's picture

Today’s work places are built upon a web of disparate systems—physical access to doors and locks, access to IT and printer networks, meeting room management, food and beverage vending—that employees, visitors and vendors continually interact with, experiencing varying degrees of satisfaction. But when these systems are made identity aware to tap into a common understanding of who you are and...

Continue reading >>

Pages