Industry blog

Posted: 27 Feb 2020's picture

The fast-changing digital world, remote workforces and mobile apps of today’s complex IT environments require businesses to continually improve their security posture. As IT and cybersecurity professionals look to utilize strong user authentication technology, they seek the following requirements: easy deployment and management, flexibility to protect both on-premises and cloud-based...

Continue reading >>
Posted: 14 Nov 2019's picture

State governments, municipalities and other local agencies can sometimes struggle with authenticating their citizens, particularly in an increasingly mobile world. Effective identity and access management is vital to protecting sensitive data but must be balanced against the...

Continue reading >>
Posted: 16 Sep 2019's picture

Identity and access management (IAM) is top-of-mind for IT departments across state governments, municipalities, and other local areas. Government employees need properly-authorized access to relevant information so that state and regional agencies can perform their roles. At the same time, the need to balance ease-of-access to data with the...

Continue reading >>
Posted: 15 Apr 2019's picture

Passwords remain a significant cybersecurity risk for organizations of all sizes.

With Password-related attacks on internet-facing applications as well as internal applications ranging from phishing, guessing weak passwords, password stuffing and keyloggers to rainbow tables, social engineering, and...

Continue reading >>
Posted: 25 Sep 2018's picture

Passwords are an annoyance for employees, a leading security risk for organizations and costly for IT to support. The IT industry has been on a quest to eliminate passwords for some time and earlier this year, Microsoft announced FIDO2 security keys for Windows Hello so...

Continue reading >>
Posted: 31 May 2018's picture

The Securing Federal Identity event will take place in Washington, D.C. on June 5-6, 2018. This event is a great opportunity to hear from government and industry experts about the latest trends in digital identities and how they affect Federal Agencies.

HID Global is privileged to again be a Platinum sponsor for this event. HID will...

Continue reading >>
Posted: 21 Mar 2018's picture

Spectre and Meltdown are two recently discovered security flaws that affect modern CPUs on PC mobile devices.  While these vulnerabilities are being mitigated, it may be a good time to consider how this may impact your user authentication strategy.

Those two flaws take advantage of multiple applications running in parallel to perform timing and side-...

Continue reading >>
Posted: 31 Oct 2017's picture

On October 16th 2017, the NIST National Vulnerability Database added entry CVE-2017-15361 describing a bug in an Infineon RSA library used in many Trusted Platform Modules and smart cards currently in use. This vulnerability would possibly allow discovery of private RSA keys, even without possession of your smart card or TPM.  From...

Continue reading >>
Posted: 14 Sep 2017's picture

With PIV and CAC credentials, US federal agencies and military bases have issued the most powerful ID credential for their employees and contractors.  PIV/CAC credentials provide a secure, standardized identification that can be trusted across US government organizations thanks to the use of US Federal Bridge...

Continue reading >>
Posted: 01 Jun 2017's picture

The Securing Federal Identities 2017 event is almost here. Securing Federal Identities 2017 is scheduled for June 6th in Washington, DC and highlights the present and future direction of the US government’s efforts to manage identities and control access across all federal agencies....

Continue reading >>