Industry blog

Posted: 14 Nov 2019
ymassard@hidglobal.com's picture

State governments, municipalities and other local agencies can sometimes struggle with authenticating their citizens, particularly in an increasingly mobile world. Effective identity and access management is vital to protecting sensitive data but must be balanced against the...

Continue reading >>
Posted: 16 Sep 2019
ymassard@hidglobal.com's picture

Identity and access management (IAM) is top-of-mind for IT departments across state governments, municipalities, and other local areas. Government employees need properly-authorized access to relevant information so that state and regional agencies can perform their roles. At the same time, the need to balance ease-of-access to data with the...

Continue reading >>
Posted: 15 Apr 2019
ymassard@hidglobal.com's picture

Passwords remain a significant cybersecurity risk for organizations of all sizes.

With Password-related attacks on internet-facing applications as well as internal applications ranging from phishing, guessing weak passwords, password stuffing and keyloggers to rainbow tables, social engineering, and...

Continue reading >>
Posted: 25 Sep 2018
ymassard@hidglobal.com's picture

Passwords are an annoyance for employees, a leading security risk for organizations and costly for IT to support. The IT industry has been on a quest to eliminate passwords for some time and earlier this year, Microsoft announced FIDO2 security keys for Windows Hello so...

Continue reading >>
Posted: 31 May 2018
ymassard@hidglobal.com's picture

The Securing Federal Identity event will take place in Washington, D.C. on June 5-6, 2018. This event is a great opportunity to hear from government and industry experts about the latest trends in digital identities and how they affect Federal Agencies.

HID Global is privileged to again be a Platinum sponsor for this event. HID will...

Continue reading >>
Posted: 21 Mar 2018
ymassard@hidglobal.com's picture

Spectre and Meltdown are two recently discovered security flaws that affect modern CPUs on PC mobile devices.  While these vulnerabilities are being mitigated, it may be a good time to consider how this may impact your user authentication strategy.

Those two flaws take advantage of multiple applications running in parallel to perform timing and side-...

Continue reading >>
Posted: 31 Oct 2017
ymassard@hidglobal.com's picture

On October 16th 2017, the NIST National Vulnerability Database added entry CVE-2017-15361 describing a bug in an Infineon RSA library used in many Trusted Platform Modules and smart cards currently in use. This vulnerability would possibly allow discovery of private RSA keys, even without possession of your smart card or TPM.  From...

Continue reading >>
Posted: 14 Sep 2017
ymassard@hidglobal.com's picture

With PIV and CAC credentials, US federal agencies and military bases have issued the most powerful ID credential for their employees and contractors.  PIV/CAC credentials provide a secure, standardized identification that can be trusted across US government organizations thanks to the use of US Federal Bridge...

Continue reading >>
Posted: 01 Jun 2017
ymassard@hidglobal.com's picture

The Securing Federal Identities 2017 event is almost here. Securing Federal Identities 2017 is scheduled for June 6th in Washington, DC and highlights the present and future direction of the US government’s efforts to manage identities and control access across all federal agencies....

Continue reading >>
Posted: 30 May 2017
ymassard@hidglobal.com's picture

The US Federal government has been working to dramatically improve its security posture over the last 2 years.  As it approaches this from a holistic standpoint, the US Federal government is starting to require Federal contractors to improve their own security posture as well.  This is evidenced by the Federal Acquisition Rule (FAR) 52.204-21 “...

Continue reading >>

Pages