Industry blog

Posted: 16 Apr 2018

The use of the password as an instrument of authentication has outlived its usefulness. The era of the password has passed. How did IDC come to this conclusion? It is simple really.

IDC would point to common "best practice: password hygiene.” Common password hygiene generally entails the following:

  1. Use a...
Posted: 16 Apr 2018

It has been clear for years that passwords alone are not enough to protect your company’s assets, networks, applications and data.  In fact, Verizon did an analysis in 2017 that determined 81% of data breaches globally involved the misuse or stolen or weak passwords.  With the number of breaches increasing every year, and the cost and consequences of those breaches also on the rise, the time...

Posted: 03 Apr 2018

HID Global’s Identity and Access Management team is once again excited to interact with other leaders in the information security space at the 2018 RSA Conference in a few weeks.  We have a lot of exciting news and activities planned for the week.   

We’re starting RSA out with a bang as some of our team members will be donning their...

Posted: 26 Mar 2018

The multi-factor authentication market is experiencing new dynamics. For the last 15 years, strong authentication was not a top of mind concern for organizations and was mainly based on hardware tokens generating one-time passwords (OTPs), a temporary 6 or 8 digit password. The user was required to first generate an OTP on his token and then copy/paste it into his online portal. It has been...

Posted: 21 Mar 2018

Spectre and Meltdown are two recently discovered security flaws that affect modern CPUs on PC mobile devices.  While these vulnerabilities are being mitigated, it may be a good time to consider how this may impact your user authentication strategy.

Those two flaws take advantage of multiple applications running in parallel to perform timing and side-...

Posted: 20 Mar 2018

With thousands of people pouring into and out of high-rise office buildings each day, there is a growing demand to not only ensure the safety and security of each person, but to also create more connected experiences for people interacting with buildings.   Technologies are emerging to expand how building occupants and tenants engage, interact and work in new intelligent workspaces. In...

Posted: 06 Mar 2018

Earlier this week SecurityWeek magazine reported on a SAML (Security Assertion Markup Language) vulnerability that was discovered and self-reported by a Single Sign-On vendor. These flaws were not isolated to a single vendor product and were reported across various products used for two-factor authentication. Exploiting these flaws could enable a Man in the Middle attack allowing unintended...

Posted: 22 Feb 2018

As workplaces transition to more connected environments that are aware of their occupants and offer them seamless, personalized experiences, the challenge of identifying an individual remains constant. Connected environments rely on understanding who is interacting with the environment and the needs of those individuals in order to ensure that the right services are seamlessly available to...

Posted: 12 Jan 2018

Last week, cyber security researchers revealed two major security flaws that allegedly affect processing chips in a large number of devices.  The world was taken by surprise, and virtually every tech company has had to look at the potential impact of these flaws on their products.  Taking the security of HID products extremely seriously, we are in the process of doing a thorough investigation...

Pages