CFOtech Asia - Technology news for CFOs & financial decision-makers

HID stories - Page 50

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Thinkstockphotos 147539280

Equifax ushers new CISO as breach fallout continues

Wed, 14th Feb 2018
#
breach prevention
#
cybersecurity
#
data breach
Equifax has ushered in a new chief information security officer as the fallout continues from the company's massive US data breach last year.
Thinkstockphotos 869085112

Malicious PoriewSpy app spies on Android devices in India

Tue, 13th Feb 2018
#
malware
#
cybersecurity
#
trend micro
A malicious app called PoriewSpy is targeting Android users in India and is capable of stealing device information as well as making audio recordings.
Thinkstockphotos 481086900

Attackers unleash Lokibot malware on unpatched Windows systems

Tue, 13th Feb 2018
#
malware
#
cybersecurity
#
microsoft
Lokibot malware targets unpatched Windows systems exploiting CVE-2017-11882; researchers urge timely updates and restricted installer access to combat threats.
Thinkstockphotos 689019766

Criminals exploit SSL encryption & free certificates in malware attacks

Mon, 12th Feb 2018
#
encryption
#
zscaler
#
ssl certificate
Firms may not inspect SSL traffic because they assume it comes from trusted sources. That has now changed and SSL is now a 'significant' blind spot'.
Screen shot 2018 02 09 at 10

Survey finds businesses stung with $16m hidden cybersecurity costs every year

Fri, 9th Feb 2018
#
malware
#
endpoint protection
#
edr
New research from Bromium has found the hidden costs of 'detect-to-protect' security are immense with businesses being blindsided every year.
Thinkstockphotos 692768728

Corporate SaaS apps teeming with malware - OneDrive scores highest infection rate

Thu, 8th Feb 2018
#
malware
#
ransomware
#
casb
The research showed that 44% of scanned organisations had some form of malware in at least one of their cloud applications.
Thinkstockphotos 613026810

Japan firm Nihon Cornet to deliver BlackRidge next-gen cybersecurity

Wed, 7th Feb 2018
#
cybersecurity
#
healthtech
#
resellers
Japan-based network & cybersecurity provider Nihon Cornet Technology is working with defense provider BlackRidge Technology to deliver the solutions.
Thinkstockphotos 492661795

Four steps organisations can take to protect against encrypted tunnel attacks

Mon, 5th Feb 2018
#
encryption
#
phishing
#
email security
Nefarious actors can use encrypted tunnels to pivot across corporate networks, eavesdrop, route traffic to phishing websites & access sensitive data.
Thinkstockphotos 507567848

Why trusted identities will create more intelligent experiences this year

Mon, 5th Feb 2018
#
iam
#
cybersecurity
#
hid global
This year, identity tech, driven by trusted identities, will create more intelligent experiences through IoT, cloud and data analytics, predicts HID Global.
Saas

Probax empowers partners to move away from legacy tape

Thu, 1st Feb 2018
#
virtualisation
#
partner programmes
#
veeam
Probax is setting out to address the challenges MSPs and system integrators face in delivering secure long-term storage as a service.
Thinkstockphotos 905402102

From Dridex to Friedex: Malware creators dabble in ransomware

Wed, 31st Jan 2018
#
malware
#
ransomware
#
cybersecurity
The creators of the Dridex banking Trojan are also responsible for FriedEx (also known as BitPaymer), a ransomware that was discovered in mid-2017.
Fallback

How to stop 'sleeper-agent' hackers from causing havoc

Wed, 24th Jan 2018
#
data analytics
#
siem
#
martech
In an evolving cyber threat landscape, companies pivot from prevention to detection, with 60% of budgets geared towards rapid response, reveals Gartner.
Assassins hidden

Assassin's Creed Origins DLC gets a release date

Thu, 18th Jan 2018
#
gaming
#
digital entertainment
#
assassin's creed
Players can continue their journey through Ancient Egypt with a wide variety of new content, including several hours of storyline quests.
Parents beware

Parents beware! Malware may be hitchhiking on game apps

Wed, 17th Jan 2018
#
malware
#
gaming
#
digital entertainment
Cyber-criminals are targeting game apps intended for children, infecting them with 'AdultSwine' malware on Google Play, Check Point researchers warn.
Fortnite

Game review: Fortnite Battle Royale costs nothing and gives everything

Fri, 12th Jan 2018
#
gaming
#
digital entertainment
#
reviews
Fortnite Battle Royale blends vibrant 80's cartoon aesthetics with intense playstyle options, offering a thrilling and free-to-play gaming experience.
Thinkstockphotos 482233271

Qlik: An introduction to big data and business intelligence

Thu, 11th Jan 2018
#
data analytics
#
martech
#
planning
It is vital that we understand the critical relationship between big data and BI, as without one another they are fruitless to an organisation.
Thinkstockphotos 667315360

How to regain customers' trust after a CX failure

Tue, 9th Jan 2018
#
crm
#
uc
#
cx
After a year rife with Customer Experience (CX) failures, Australian companies must repair consumer trust through transparency and reliable service delivery.
Dashboard forecast

IoT, AI, blockchain, biometrics – Hitachi Vantara's 10 key trends for 2018

Wed, 6th Dec 2017
#
storage
#
virtualisation
#
devops
Smart object storage, analytics and AI, and the extension of agile methodologies across the enterprise will all play key roles during the coming year.
Thinkstockphotos 179692973

Facing a hidden truth: Running data centers is not your core competency

Tue, 5th Dec 2017
#
datacentre infrastructure
#
hyperscale
#
power / energy
Many firms, even large ones, lack the core competency of running data centers efficiently, reveals Schneider Electric. Key services are often better outsourced.
Cozmo

Hands-on Review: Anki's Cozmo, play with the AI of the future

Tue, 5th Dec 2017
#
gaming
#
robots
#
digital entertainment
Experience the future of AI play with Anki's Cozmo! This smart, interactive robot learns, recognises faces, and teaches coding through playful interaction.