Industry blog

Posted: 31 May 2018
ymassard@hidglobal.com's picture

The Securing Federal Identity event will take place in Washington, D.C. on June 5-6, 2018. This event is a great opportunity to hear from government and industry experts about the latest trends in digital identities and how they affect Federal Agencies.

HID Global is privileged to again be a Platinum sponsor for this event. HID will...

Posted: 23 May 2018
harrehed's picture

As the General Data Protection Regulation (GDPR) takes affect this week (May 25), we reflect on how mobile access customers, who enable users to use their phones as a “key” to unlock doors, have been adapting and becoming compliant-ready for months.  User data is, of course, utilized in cloud services-based mobile access to connect individuals’ phones (and their identities) to the back-end of...

Posted: 16 Apr 2018
kwalker's picture

It has been clear for years that passwords alone are not enough to protect your company’s assets, networks, applications and data.  In fact, Verizon did an analysis in 2017 that determined 81% of data breaches globally involved the misuse or stolen or weak passwords.  With the number of breaches increasing every year, and the cost and consequences of those breaches also on the rise, the time...

Posted: 15 Apr 2018
fdickson's picture

The use of the password as an instrument of authentication has outlived its usefulness. The era of the password has passed. How did IDC come to this conclusion? It is simple really.

IDC would point to common "best practice: password hygiene.” Common password hygiene generally entails the following:

  1. Use a...
Posted: 26 Mar 2018
othiriondebriel's picture

The multi-factor authentication market is experiencing new dynamics. For the last 15 years, strong authentication was not a top of mind concern for organizations and was mainly based on hardware tokens generating one-time passwords (OTPs), a temporary 6 or 8 digit password. The user was required to first generate an OTP on his token and then copy/paste it into his online portal. It has been...

Posted: 21 Mar 2018
ymassard@hidglobal.com's picture

Spectre and Meltdown are two recently discovered security flaws that affect modern CPUs on PC mobile devices.  While these vulnerabilities are being mitigated, it may be a good time to consider how this may impact your user authentication strategy.

Those two flaws take advantage of multiple applications running in parallel to perform timing and side-...

Posted: 20 Mar 2018
mrobinton's picture

With thousands of people pouring into and out of high-rise office buildings each day, there is a growing demand to not only ensure the safety and security of each person, but to also create more connected experiences for people interacting with buildings.   Technologies are emerging to expand how building occupants and tenants engage, interact and work in new intelligent workspaces. In...

Posted: 06 Mar 2018
pan.kamal's picture

Earlier this week SecurityWeek magazine reported on a SAML (Security Assertion Markup Language) vulnerability that was discovered and self-reported by a Single Sign-On vendor. These flaws were not isolated to a single vendor product and were reported across various products used for two-factor authentication. Exploiting these flaws could enable a Man in the Middle attack allowing unintended...

Posted: 22 Feb 2018
amalpani's picture

As workplaces transition to more connected environments that are aware of their occupants and offer them seamless, personalized experiences, the challenge of identifying an individual remains constant. Connected environments rely on understanding who is interacting with the environment and the needs of those individuals in order to ensure that the right services are seamlessly available to...

Posted: 12 Jan 2018
dlearmonth's picture

Last week, cyber security researchers revealed two major security flaws that allegedly affect processing chips in a large number of devices.  The world was taken by surprise, and virtually every tech company has had to look at the potential impact of these flaws on their products.  Taking the security of HID products extremely seriously, we are in the process of doing a thorough investigation...

Pages