The global COVID-19 pandemic has significantly impacted life. Entire organizations were forced to work remotely while cybersecurity teams were suddenly adapting to protect mission-critical data and IT environments in new ways. Initially, it was perceived as a temporary impact, which later became a long-term change, causing teams to redefine their cybersecurity strategy. The cyber-attack vector...
Continue reading >>
Verifying the identity of new customers is essential to compliance, regulation and keeping customer and business data safe. Confirming someone’s identity...
Continue reading >>There have been a number of initiatives to add payment capabilities to ID cards (e.g., Nigeria and Maldives National ID cards), as well as programs where governments have stepped in to provide payment capabilities to their citizens (e.g., a fuel subsidy card in Egypt and digital cash in Ecuador).
...
Continue reading >>Smarter World is a part of The NXP® Podcast, Insights Into Trailblazing Technologies. In this episode, EE Times Editor Nitin Dahad is joined by Charles Dachs, VP & General Manager, Secure Embedded Transactions at NXP Semiconductors, and Ramesh Songukrishnasamy, SVP & CTO at HID Global, to explore UWB’s evolution from a...
Continue reading >>On a July evening in 2008 in Duluth, Georgia, 40-year-old Genai Coleman was sitting in her car near a transit station, reading from her bible while waiting for her daughter to finish work. Across the street, a man walked out of a gas station, pointed a gun at her and demanded she get out of the car. Then he shot her, pulled her out of the car and drove away.
...
Continue reading >>How much does your organization spend on cybersecurity? Across industries, average spending on cybersecurity is five to eight percent of the overall technology budget and steadily rising. Yet the cybercrime numbers are shocking: it’s predicted that cybercrime will cost the...
Continue reading >>Around 50% of the countries that have switched from a non-electronic to an e-Passport (also known as a biometric passport) are not profiting from its new security potential. The reason is that they share the certificates that validate the personal data of a traveler on the e-Passport in a non-...
Continue reading >>As organizations consider a return to the physical workplace, they must adapt to new requirements, implement new procedures, and leverage technology to alleviate their employees’ concerns.
Physical access is a prime area of interest. Crowded entrances, elevators and shared working spaces are obstacles to safe social distancing. Likewise, some security processes, like credentialing, have...
Continue reading >>We live in an era of hybrid cloud infrastructure where some IT infrastructure resides on-premises and the majority of the IT resources are hosted in the cloud. However, the strategy to secure those resources and protect data is not the same for cloud resources and on-premise systems. Public Key Infrastructure (PKI) is a proven technology used to secure network devices, IT systems and IoT...
Continue reading >>Digital banking applications and portals have often had to deal with a dilemma: should access be more secure or more convenient? It has been a difficult needle to thread — more security often led to greater friction for the user, while more convenience exposed their identity and account to theft.
...
Continue reading >>








