Industry blog

Posted: 15 Apr 2019's picture

Passwords remain a significant cybersecurity risk for organizations of all sizes.

With Password-related attacks on internet-facing applications as well as internal applications ranging from phishing, guessing weak passwords, password stuffing and keyloggers to rainbow tables, social engineering, and...

Continue reading >>
Posted: 25 Sep 2018's picture

Passwords are an annoyance for employees, a leading security risk for organizations and costly for IT to support. The IT industry has been on a quest to eliminate passwords for some time and earlier this year, Microsoft announced FIDO2 security keys for Windows Hello so...

Continue reading >>
Posted: 31 May 2018's picture

The Securing Federal Identity event will take place in Washington, D.C. on June 5-6, 2018. This event is a great opportunity to hear from government and industry experts about the latest trends in digital identities and how they affect Federal Agencies.

HID Global is privileged to again be a Platinum sponsor for this event. HID will...

Continue reading >>
Posted: 21 Mar 2018's picture

Spectre and Meltdown are two recently discovered security flaws that affect modern CPUs on PC mobile devices.  While these vulnerabilities are being mitigated, it may be a good time to consider how this may impact your user authentication strategy.

Those two flaws take advantage of multiple applications running in parallel to perform timing and side-...

Continue reading >>
Posted: 31 Oct 2017's picture

On October 16th 2017, the NIST National Vulnerability Database added entry CVE-2017-15361 describing a bug in an Infineon RSA library used in many Trusted Platform Modules and smart cards currently in use. This vulnerability would possibly allow discovery of private RSA keys, even without possession of your smart card or TPM.  From...

Continue reading >>
Posted: 14 Sep 2017's picture

With PIV and CAC credentials, US federal agencies and military bases have issued the most powerful ID credential for their employees and contractors.  PIV/CAC credentials provide a secure, standardized identification that can be trusted across US government organizations thanks to the use of US Federal Bridge...

Continue reading >>
Posted: 01 Jun 2017's picture

The Securing Federal Identities 2017 event is almost here. Securing Federal Identities 2017 is scheduled for June 6th in Washington, DC and highlights the present and future direction of the US government’s efforts to manage identities and control access across all federal agencies....

Continue reading >>
Posted: 30 May 2017's picture

The US Federal government has been working to dramatically improve its security posture over the last 2 years.  As it approaches this from a holistic standpoint, the US Federal government is starting to require Federal contractors to improve their own security posture as well.  This is evidenced by the Federal Acquisition Rule (FAR) 52.204-21 “...

Continue reading >>
Posted: 01 Feb 2017's picture

Last month, we released our HID PIV solution, which provides complete identity lifecycle management--from identity proofing plus secure credential issuance and use, to deprovisioning of credentials.  The PIV, ...

Continue reading >>