Industry blog

Posted: 03 Oct 2019
fjacquot's picture

Passport technology is changing from the paper of the past. In the last 15 years, more than 150 countries have moved to a highly secure electronic passport that uses an inlay to support a microcontroller chip. Still, the strongest trend in passports is a polycarbonate (PC) datapage. As of today, more than 40 countries have upgraded their travel documents from the standard paper-and-laminate...

Continue reading >>
Posted: 03 Oct 2019
jcarpenter's picture

Today’s fast-changing digital environment is throwing identity and authentication challenges at us from every direction. Remote workforces, mobile apps, the Internet of Things (IoT) and increasingly complex data theft schemes just keep upping cybersecurity risks in every type of organization.

...

Continue reading >>
Posted: 24 Sep 2019
ilowe's picture

Part of the FAA’s mission is to make sure that airports comply with security standards to keep employees, passengers, and others safe when they are on the ground and in the air, but managing compliance with FAA rules and airport security policy can be complicated. Ensuring that airport employees, temporary contractors and other personnel get to work quickly and easily requires a balance of...

Continue reading >>
Posted: 23 Sep 2019
vgourmelen's picture

Identity documents have come a long way since their introduction in 1414 by King Henry V of England, as part of the Safe Conduct Act. For the next 500 years, various proofs of identity emerged but most people didn't need to carry one. The need to use identity documents not only for identifying but also authenticating the holder of the document became apparent during the first year of World War...

Continue reading >>
Posted: 16 Sep 2019
ymassard@hidglobal.com's picture

Identity and access management (IAM) is top-of-mind for IT departments across state governments, municipalities, and other local areas. Government employees need properly-authorized access to relevant information so that state and regional agencies can perform their roles. At the same time, the need to balance ease-of-access to data with the...

Continue reading >>
Posted: 23 Aug 2019
jcarpenter's picture

Employees enter login credentials and, once authenticated, gain secure access to valuable network resources and applications. However, requiring users to go through the authentication process only once is turning out to be a risk factor in itself. This process leaves organizations vulnerable to risk every time an employee steps away from their desk, clicks a link, shares a password, or...

Continue reading >>
Posted: 19 Aug 2019
rmegonigal's picture

While often used for identification purposes to cross an international border or to gain access to a device or a location, biometrics―such as fingerprints―have advanced to become an integral part of criminal and forensic investigations.

It is easy to take for granted that it has taken more than 100 years to develop the technology that makes the capturing of biometrics as...

Continue reading >>
Posted: 14 Aug 2019
jcarpenter's picture

The online hub for the modern workforce is the mobile phone—making reliable, frictionless security critical. Without it, text messages, location data, contacts and any account information stored on the phone is at risk for theft and misuse. Moreover, the broader universe of enterprise applications accessed through the mobile device can be imperiled.

...

Continue reading >>
Posted: 01 Aug 2019
jmacinnis's picture



“Success in creating AI would be the biggest event in human history. Unfortunately, it might also be the last, unless we learn how to avoid the risks.”

– Steven Hawking...

Continue reading >>
Posted: 30 Jul 2019
bdegonia's picture

Background checks. Governments, corporations, healthcare organizations and financial institutions require them as part of their hiring process. They help identify individuals who have criminal backgrounds and therefore are ineligible for employment. Background checks help organizations reduce their risk, comply with legal requirements, ensure public safety and provide customer assurance....

Continue reading >>

Pages