CFOtech Asia - Technology news for CFOs & financial decision-makers

HID stories - Page 42

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Cloud security9

McAfee announces Google Cloud Platform support

Thu, 18th Apr 2019
#
hyperscale
#
public cloud
#
cloud security
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Gettyimages 958679454

Fitbit and Snap think you want emojis on your fitness trackers

Mon, 8th Apr 2019
#
fitbit
#
snap
#
emoji
Fitbit and Snap have launched a Bitmoji app for Fitbit smartwatches, adding avatars to depict users' health and fitness progress.
Gettyimages 890004548

Study analyses drones' potential to be weapons of cyber attacks & terrorism

Mon, 1st Apr 2019
#
drones
#
data privacy
#
cybersecurity
The biggest challenge, according to the research, is finding out what a drone's purpose is in a non-restricted area.
Gettyimages 943065362

Backup: Private cloud to the rescue when public cloud fails

Thu, 28th Mar 2019
#
dr
#
private cloud
#
public cloud
Synology's Simon Hwang highlights the unforeseen risk of storing data on public cloud putting businesses in a difficult situation.
Gettyimages 951677856

Europol makes 61 arrests & nets €6.2 million in dark web crackdown

Wed, 27th Mar 2019
#
cybersecurity
#
dark web
#
europol
Europol's international operation against dark web crime sees 61 arrests, seizes EUR €6.2 million, and closes 50 accounts; drugs and firearms also confiscated.
Gettyimages 177409226

Dropbox brings in-country document hosting to ANZ & Japan

Mon, 25th Mar 2019
#
document management
#
ecm
#
martech
Dropbox Business users in New Zealand, Australia, and Japan will be able to store their Dropbox files in-country, beginning in the second half of 2019.
Xiaomi 1

Hands-on Review: Xiaomi's Mi Mix 3 and the Amazfit Bip

Thu, 21st Mar 2019
#
gaming
#
wearables
#
semiconductors
Xiaomi impresses with its solid Mi Mix 3 smartphone and the budget-friendly Amazfit Bip smartwatch, showcasing innovation and value in the tech sector.
Techday b2e21df90a7e7704c232

Slingshot recruits celebs to design modems that aren't eyesores

Thu, 21st Mar 2019
#
uc
#
slingshot
#
router
With most modems being banished to dark corners or closets, Slingshot is looking to change the trend with its uniquely designed modems.
Malware6

Check Point names February's most disruptive malware

Tue, 12th Mar 2019
#
security vulnerabilities
#
coinhive
#
cryptomining
Coinhive tops Check Point's Global Threat Index for February 2019, marking its 15th month as the most disruptive malware despite its impending shutdown.
Sara kurfess 794955 unsplash

Cybercriminals earning over $3billion annually exploiting social platforms

Mon, 11th Mar 2019
#
cybersecurity
#
social media
#
cybercrime
Cybercriminals exploiting social media platforms rake in over USD $3 billion annually, a study sponsored by Bromium and led by the University of Surrey reveals.
Network security3

LogRhythm launches solution to address network-borne threats

Mon, 11th Mar 2019
#
firewalls
#
network infrastructure
#
siem
LogRhythm has launched LogRhythm NDR, a new automated network security tool designed to aid understaffed teams in detecting and responding to network threats.
Woman professional copy

Where to from here? Women in cybersecurity speak up

Fri, 8th Mar 2019
#
iwd
#
dei
#
solar power
Women in cybersecurity discuss challenges from gender pay gaps to toxic workplaces on International Women's Day, urging for a more gender-balanced industry.
Hackerr

The cyber kill chain: Moving laterally in Active Directory

Mon, 4th Mar 2019
#
ueba
#
manageengine
#
opinion
Despite robust defences, companies are vulnerable to lateral moves in Active Directory by cybercriminals who exploit social engineering and malware.
Cybersecurity20

New threats on the block: Formjacking, IoT, LotL attacks

Tue, 26th Feb 2019
#
iot security
#
iot
#
iiot
Cybercriminals shift focus from ransomware to formjacking and IoT exploits, with Symantec's latest report revealing tens of millions of dollars in losses.
Lenovo

Lenovo's latest ThinkPads get a security boost

Tue, 26th Feb 2019
#
lenovo
#
amd
#
mobility
Keeping in line with the torrent of product releases coming out of MWC Barcelona this week, Lenovo has added a range of new devices to its ThinkPad family.
Cryptojacking

CSOs - are you prepared for cloud cryptojacking?

Mon, 18th Feb 2019
#
mfa
#
cloud security
#
iaas
A recent report found that almost half of the organisations surveyed have malware in one of their cloud applications.
Malware3

New threat rears its head in new malware report

Thu, 14th Feb 2019
#
malware
#
cybersecurity
#
cryptomalware
Check Point's researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Thinkstockphotos 911053906

Hyundai works with IBM to create a new blockchain-based platform

Thu, 14th Feb 2019
#
uc
#
blockchain
#
martech
The network for commercial financing will supposedly provide participants with a single view of all the transactions happening in the network.
Gettyimages 961970568

IBM opens up Watson to run on anything, anywhere

Wed, 13th Feb 2019
#
uc
#
public cloud
#
martech
IBM opens up Watson AI across any cloud, championing industry-wide transformation by breaking data silos and offering seamless AI integration.
Screen shot 2019 02 11 at 3

Kiwi partner named in HubSpot's global top five

Tue, 12th Feb 2019
#
devops
#
data analytics
#
martech
Hype & Dexter is an Auckland-based agency that specialises in providing organisations with marketing automation solutions.