CFOtech Asia - Technology news for CFOs & financial decision-makers

HID stories - Page 49

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Thinkstockphotos 484125606 n2fby77

Old group, new tricks: OceanLotus threat group continues to target East Asia

Thu, 15th Mar 2018
#
malware
#
advanced persistent threat protection
#
cybersecurity
ESET researchers have been on the trail of cyber hacking group OceanLotus, a group known for its campaigns creating havoc in Eastern Asia countries.
Thinkstockphotos 924555558

Pegasystems: Making the art of selling smarter with AI

Thu, 15th Mar 2018
#
data analytics
#
martech
#
planning
Pegasystems launches AI-powered Pega Sales Coach to help sales managers develop better salespeople in real time.
Screen shot 2018 03 14 at 11

New study details how easy it is for hackers to steal your data

Thu, 15th Mar 2018
#
malware
#
cybersecurity
#
hackers
It's no secret that web browsers store a substantial amount of sensitive information about their users - hackers are taking advantage of this.
Test 940 530

Hands-on Review: ASUS ROG STRIX XG35V curved gaming monitor

Wed, 14th Mar 2018
#
gaming
#
digital signage
#
digital entertainment
ASUS's ROG STRIX XG35V offers gamers a stunning ultra-wide display with a 100Hz refresh rate and AMD's FreeSync.
Thinkstockphotos 585147856

Check Point expands portfolio to continue fight against Gen V cyber attacks

Tue, 13th Mar 2018
#
cybersecurity
#
cyber attacks
#
ipsec
Check Point partners with IPSec to offer 24x7 SOC services, expanding its security portfolio against Gen V cyber attacks and enhancing enterprise protection.
Screen shot 2018 03 12 at 10

New research finds China tampering with public vulnerability data

Mon, 12th Mar 2018
#
cybersecurity
#
fraud
#
cybercrime
Recorded Future believes China has been altering public vulnerability data to allow the Ministry of State Security to play with it first.
Ashish   new3

Interview: Exposing the dark web, its secrets and why it's a major concern for businesses

Wed, 7th Mar 2018
#
malware
#
crypto
#
blockchain
The dark web is often touted as the place cybercriminals sell their malware, but what is the fuss all about? Verizon's Ashish Thapar explains.
Screen shot 2018 03 06 at 12

REPORT: Ransomware decreasing in quantity but increasing in potency

Wed, 7th Mar 2018
#
malware
#
ransomware
#
supply chain
A new report from SonicWall has shed light on the current threat landscape with the company recording an astonishing 9.32b malware attacks in 2017.
Thinkstockphotos 696067380

Criminals abuse email attachments to cash in on 'booming' black market for stolen passwords

Fri, 2nd Mar 2018
#
firewalls
#
email security
#
breach prevention
Barracuda warns of a 'booming black market' for stolen passwords as cybercriminals increasingly use phishing emails to distribute malware.
Thinkstockphotos 105764342

Protection against malware with a cloud-based sandbox

Tue, 27th Feb 2018
#
malware
#
cybersecurity
#
cloud services
Cloud-based sandboxing arises as the new defence against sophisticated malware, promising lower false-positives.
Thinkstockphotos 845260736

Chinese websites targeted in drive-by download attack that drops DDoS bot

Tue, 27th Feb 2018
#
ddos
#
botnet
#
malwarebytes
Chinese websites are under siege by a drive-by download campaign planting the decade-old Avzhan DDoS bot, Malwarebytes Labs reveals.
Thinkstockphotos 529747065

Insights on industrial vulnerability: How secure is your OT infrastructure?

Mon, 26th Feb 2018
#
firewalls
#
network infrastructure
#
encryption
Addressing the requirements of an OT network is now more important than ever and requires an integrated approach.
Thinkstockphotos 519829270

Q4 malvertising levels drop; but scammers aren't finished yet

Fri, 23rd Feb 2018
#
mssp
#
riskiq
#
malvertising
Malvertising may be going out of fashion for cyberattackers across the board, but it doesn't mean web users can rest easy.
Thinkstockphotos 903182690

Hackers exploit Tesla's AWS servers to mine cryptocurrency

Thu, 22nd Feb 2018
#
devops
#
datacentre infrastructure
#
hyperscale
Tesla is reassuring customers that a recent cryptojacking has not compromised vehicle safety of customer privacy.
Screen shot 2018 02 21 at 11

Check Point releases January's 'most wanted' malware

Wed, 21st Feb 2018
#
malware
#
crypto
#
blockchain
23% of organisations around the world were affected by Check Point's 'most wanted' malware in January, a 'lucrative' revenue stream for criminals.
Thinkstockphotos 533557042

Assessing the rising threat of encrypted tunnels

Wed, 21st Feb 2018
#
endpoint protection
#
encryption
#
edr
Venafi senior technical manager Nick Hunter takes a look at five key threats posed by encrypted tunnel attacks.
Thinkstockphotos 641517852

United States hot on heels of North Korea's Hidden Cobra malware

Mon, 19th Feb 2018
#
malware
#
ddos
#
cybersecurity
The United States Computer Emergency Readiness Team (US-CERT) is honing in on the North Korean Government's activities known as HIDDEN COBRA.
Thinkstockphotos 880737456

New email spam campaign ditches traditional Office macro infection tactic

Mon, 19th Feb 2018
#
malware
#
email security
#
cybersecurity
A new wave of spam emails use Microsoft Office documents to download password stealers without having to activate Macros.
Screen shot 2018 02 15 at 12

New advisory platform finds 41m PDFs part of a cyberattack in last 3 months

Fri, 16th Feb 2018
#
malware
#
firewalls
#
ransomware
Barracuda announced the availability of its new platform that provides advanced threat trends in real time - along with some shocking findings.
Thinkstockphotos 846400236 1

Uptime Institute to start testing hybrid IT resiliency

Thu, 15th Feb 2018
#
hybrid cloud
#
hyperscale
#
cloud services
The number of organizations with complex infrastructures comprised of multiple data centers, colocation facilities and the cloud is on the rise.