Industry blog

Posted: 02 Apr 2020
jcarpenter's picture

Chances are you are deep in the middle of a remote working scenario that is not of your own creation. The current infectious disease outbreak has sent workforces everywhere scrambling. Employees who have never worked remotely suddenly find themselves dispatched to home offices, IT is under incredible stress, and—as of this writing—it’s hard to predict when we will return to normal.

Hang...

Continue reading >>
Posted: 31 Mar 2020
jcarpenter's picture

Largely the province of military and government powers throughout history, cryptography has evolved significantly over time. From its secretive beginnings as a way to keep sensitive written messages safe from enemies, cryptography has morphed into multiple uses for confidentiality and integrity. This method of hidden (from the Greek kryptόs) writing (from the Greek gráphō) has moved from clay...

Continue reading >>
Posted: 30 Mar 2020
othiriondebriel's picture

Cybercriminals are using ever-evolving, sophisticated techniques to steal user identities, data and money. At the same time, customers are demanding ubiquitous access to their financial information and banking services. These two factors combine to create a complex threat landscape that requires strong technology, constant vigilance, and fraud detection to protect financial systems and...

Continue reading >>
Posted: 25 Mar 2020
jcarpenter's picture

When you hear the word “espionage,” which spy movie comes to mind?

007? Jason Bourne? Mission Impossible? Unfortunately, corporate espionage isn’t just in the movies—it’s a real threat that has become an ever-evolving challenge to companies large and small. No matter the industry, if your company develops any form of new technology or intellectual property of interest to your...

Continue reading >>
Posted: 25 Mar 2020
lwoodson's picture

As we find ourselves learning to work in new ways where business as usual doesn’t apply, it is essential to identify opportunities that build connection, help us move from a threat to reward state, and live our values of empowerment, integrity and innovation.

...

Continue reading >>
Posted: 09 Mar 2020
ilowe's picture

How Our Customers are Using HID SAFE™ Visitor Management to Minimize Infection Risks

In an emergency, workplace preparation and clear communication are critical. We’ve compiled a list of essential best practices learned from customers, including ones in healthcare, that...

Continue reading >>
Posted: 06 Mar 2020
stilmann's picture

The follow article contains potentially disturbing references to child abduction and sexual assault.

“Any investigator has that one case they wished they’d finished, and this was mine. I just kept working on it. I wanted to get justice for that girl and her family.”

...

Continue reading >>
Posted: 04 Mar 2020
mchandarana's picture

There’s a new-ish acronym in town: BEC (business email compromise). BEC is what law enforcement agencies and analysts are now calling phishing that targets corporate structures and public entities, thanks to the rise in frequency and complexity of these scams. As network security hardens, bad actors have to find another way in. Too often, users are the weakest link in...

Continue reading >>
Posted: 28 Feb 2020
SWarne's picture

The age of convenience is here, and we all want to identify ourselves with mobile, digital or contactless technologies. While it is true that the drive for continually simpler ways to prove our identity will intensify, there needs to be a secure root identity which underpins the security of these new processes and technologies. Governments, issuing authorities, police and border forces all...

Continue reading >>
Posted: 27 Feb 2020
ymassard@hidglobal.com's picture

The fast-changing digital world, remote workforces and mobile apps of today’s complex IT environments require businesses to continually improve their security posture. As IT and cybersecurity professionals look to utilize strong user authentication technology, they seek the following requirements: easy deployment and management, flexibility to protect both on-premises and cloud-based...

Continue reading >>

Pages