CFOtech Asia - Technology news for CFOs & financial decision-makers

HID stories - Page 44

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Cybersecurity7

Juniper simplifies data integration to improve threat detection

Thu, 6th Dec 2018
#
advanced persistent threat protection
#
juniper networks
#
threat detection
Updates to the Juniper Advanced Threat Prevention Appliances leverage third-party firewalls and security data sources.
Hackerr

FBI disrupts multiple botnets as part of anti-fraud operation

Thu, 29th Nov 2018
#
malware
#
cybersecurity
#
botnet
The FBI, with the help of F-Secure, has dismantled the 3ve ad fraud ring that manipulated traffic from 1.7 million IPs, generating USD $30 million in revenue.
Thinkstockphotos 1000857902

HID Global brings high authentication to mobile

Thu, 29th Nov 2018
#
endpoint protection
#
iam
#
edr
The company's new offering brings the security of physical authentication to Android and iOS with near-field communication technology.
Server2

Norton VPN adds New Zealand server

Wed, 28th Nov 2018
#
vpns
#
endpoint protection
#
datacentre infrastructure
The new local server will help users protect personal information and securely access private information while on the go.
Network security copy

Is your SD-WAN solution leaving you vulnerable?

Mon, 26th Nov 2018
#
firewalls
#
network infrastructure
#
sd-wan
Providing direct internet access to cloud-based applications has made deploying new security strategies designed for the distributed enterprise critical.
Thinkstockphotos 917602456

Phishing: It's all too easy on mobile devices

Thu, 22nd Nov 2018
#
endpoint protection
#
phishing
#
email security
Phishing attacks are surging on mobile devices, with 56% of users last year falling prey. Yet, firms like Lookout are stepping up with robust defences.
Intel

Intel aims to bring AI to the masses with the Neural Compute Stick 2

Wed, 21st Nov 2018
#
endpoint protection
#
apm
#
edr
Intel has launched the Neural Compute Stick 2, a USB thumb drive that enables developers to build smarter AI algorithms.
Preview screenshot2 538712

The Secrets of Dr. Wu expands Jurassic World Evolution

Wed, 21st Nov 2018
#
gaming
#
digital entertainment
#
jurassic world evolution
Players are in control of two hidden research facilities on Isla Muerta and Isla Tacaño where Dr. Henry Wu is developing a new generation of hybrid dinosaurs.
Thinkstockphotos 901677582

WatchGuard's eight (terrifying) 2019 security predictions

Fri, 16th Nov 2018
#
malware
#
uc
#
firewalls
The next evolution of ransomware, escalating nation-state attacks, biometric hacking, Wi-Fi protocol security, and Die Hard fiction becomes reality.
Cyber attack   global

Combatting the rise of Cybercrime-as-a-Service

Wed, 7th Nov 2018
#
malware
#
breach prevention
#
wireless networks
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people's identities, and more.
Screen shot 2018 11 06 at 9

Top 5 myths about cloud adoption in Asia

Tue, 6th Nov 2018
#
digital transformation
#
iaas
#
healthtech
Dell Boomi's Asia MD says there are a number of myths holding back cloud adoption, despite it being the obvious future.
Thinkstockphotos 1013156620

IBM VP: How are CIOs mastering a multi-cloud world?

Mon, 5th Nov 2018
#
hybrid cloud
#
public cloud
#
multi-cloud
IBM's Jim Freeman discusses how CIOs are making the most of multi-cloud as a new generation of cloud tools emerge.
Venafi

Seven big cybersecurity threats and how to prevent them

Mon, 5th Nov 2018
#
vpns
#
cybersecurity
#
banking
Hackers and fraudsters will go to enormous lengths to steal this data, so it's important to know about the top cyber security threats we face today.
Network   connectivity

Trend Micro and NTT DOCOMO partner on 5G security

Wed, 31st Oct 2018
#
uc
#
firewalls
#
network infrastructure
Trend Micro partners with NTT DOCOMO to develop 5G security solution, aiming to provide a secure environment for users in the 5G era.
Vpn

Eight reasons to use a VPN

Wed, 24th Oct 2018
#
firewalls
#
vpns
#
network infrastructure
By keeping your actions, your identity and your geographical location a secret, you can browse the web in the knowledge that you're not being watched.
Thinkstockphotos 666336000

BlueJeans goes in-browser with conferencing solutions

Tue, 9th Oct 2018
#
uc
#
bluejeans
#
candidates
Responding to customer feedback, it removes the need for invitees to download an application to jump onto a call.
Bunker

Carbon Black: Is your cyber panic room ready?

Fri, 5th Oct 2018
#
carbon black
#
opinion
#
cybersecurity strategy
Cybersecurity expert warns of a 'cyber winter' with a surge in destructive attacks, urging digital 'panic rooms'.
Untitled design

Exclusive interview: Gemalto's channel strategy for ANZ

Tue, 2nd Oct 2018
#
partner programmes
#
dlp
#
data privacy
Earlier this year, Gemalto appointed Tech Data as a distributor for its portfolio of SafeNet identity and data protection solutions in New Zealand.
Facebook login

Experts comment on Facebook's 50 million user credential leak

Mon, 1st Oct 2018
#
firewalls
#
network infrastructure
#
network security
Barracuda Networks, Sophos, RedLock, and Darktrace offer their views on the data leak that affected close to 50 million accounts.
Rdr2 screenshot 084

Hands-on preview: Red Dead Redemption 2

Fri, 28th Sep 2018
#
gaming
#
digital entertainment
#
red dead redemption
FutureFive's Darren Price recently checked out an hour and a half of Rockstar's highly-anticipated Red Dead Redemption 2. Here's what he thought of it.