CFOtech Asia - Technology news for CFOs & financial decision-makers

HID stories - Page 53

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Thinkstockphotos 837370952

Gemalto hails future of biometrics in ePassports for more efficient travel

Mon, 11th Sep 2017
#
biometrics
#
software development
#
passports
Gemalto's biometric self-service technologies are now being used in ePassports in 30 countries around the world.
Thinkstockphotos 479336834 1

Gender pay gap should be a social & economic priority, says WGEA

Thu, 7th Sep 2017
#
australian government
#
dei
#
stem
Two Australian government science agencies and two universities join national initiative to improve gender equity in research organizations.
Thinkstockphotos 803227404

Cobian RAT author crowdsourcing malware botnet distribution

Thu, 7th Sep 2017
#
malware
#
cybersecurity
#
zscaler
Zscaler has discovered a remote access Trojan (RAT) designed by an author who appears to be crowdsourcing the payload and infection spread.
Thinkstockphotos 692740076

Avaya ANZ expands local reach with new appointments

Thu, 7th Sep 2017
#
crm
#
digital transformation
#
cx
Avaya boosts its Australian and New Zealand operations with strategic senior hires to support growing demand for AI-driven communication solutions.
Knack 2 listing thumb 01 ps4 us 12jun17

Review: Knack 2 is a surprising improvement over the original

Wed, 6th Sep 2017
#
gaming
#
digital entertainment
#
knack
The first Knack game was a PS4 launch title and it was underwhelming and repetitive. Thankfully Knack 2 is a big improvement over the first game.
Thinkstockphotos 584571668

Are we letting the data race cloud our judgement?

Mon, 4th Sep 2017
#
hybrid cloud
#
data analytics
#
martech
It's a question that has been doing the rounds seemingly forever – how do we keep costs down while keeping our data secure?.
Thinkstockphotos 186211211

Enterprise security: The hidden perils of 'unguarded talk'

Wed, 30th Aug 2017
#
micro focus
#
enterprise security
#
opinion
Some users will share information that seems innocuous, yet can be used by attackers in social engineering attacks. Here are some common examples.
Norton

Hands-on Review: Norton WiFi Privacy

Tue, 29th Aug 2017
#
gaming
#
vpns
#
digital entertainment
Norton WiFi Privacy, more than just a VPN, offers users encryption not just from crooks, but from prying eyes and geoblocks.
Check point

Check Point's latest threat research taken from data you can see in real time

Mon, 21st Aug 2017
#
malware
#
ddos
#
ransomware
Check Point has taken the latest results from its Cyber Attack Trends: Mid Year Report from data that viewers can see happening in real time.
Thinkstockphotos 495569967

How to drop complexity and move to a more efficient security strategy

Fri, 18th Aug 2017
#
siem
#
advanced persistent threat protection
#
centurylink
Organisations should shift their focus from reacting to cyber threats to adopting proactive measures, according to CenturyLink.
Thinkstockphotos 831619104

Webroot takes over Securecast in move to take cyber awareness training to mass market

Wed, 16th Aug 2017
#
phishing
#
email security
#
ai security
Webroot has officially acquired security awareness training platform Securecast and has plans to take the new integrated solution to the mass market.
Thinkstockphotos 701055376

Interview: HID Global talks trusted identities, privacy & why we need to be ready for smart buildings

Wed, 16th Aug 2017
#
pam
#
martech
#
iam
HID Global is a major player in the identity management space and more committed to trusted identities than ever before.
Thinkstockphotos 822202520

FireEye data leaks continue - or are the hackers just trolling?

Tue, 15th Aug 2017
#
advanced persistent threat protection
#
breach prevention
#
cybersecurity
Hackers have released another batch of information supposedly belonging to cybersecurity firm FireEye, two weeks after the initial data dump.
Targeting cyber threats

Cybercrime: What to expect for the rest of 2017 and how to prepare

Wed, 9th Aug 2017
#
malware
#
ddos
#
vpns
​So far this year we have already borne witness to a multitude of serious cybercrime. NordVPN has provided insights for what the second half may hold.
Thinkstockphotos 689019692

Zscaler reports spike in malware families abusing SSL/TLS encryption as part of infection chain

Fri, 4th Aug 2017
#
malware
#
encryption
#
martech
Cyber attacks that use two common forms of encryption are on the rise, with the amount of malicious content doubling in the last six months alone.
Thinkstockphotos 800449192

Securing your unified communications: Three key considerations

Mon, 31st Jul 2017
#
uc
#
risk & compliance
#
wireless networks
Surprisingly, attacks against unified communications (UC) are some of the fastest growing and most misunderstood threats organizations face today.
Niohdlc

Review: Nioh's Defiant Honor expansion will keep challenging players

Mon, 31st Jul 2017
#
gaming
#
digital entertainment
#
ps4
It goes without saying that Nioh is one of the hardest games you will ever play. Well the new Defiant Honor DLC will give you an even bigger challenge.
Cybercriminall

The Dark Web: Is your company at risk?

Thu, 27th Jul 2017
#
risk & compliance
#
cybersecurity
#
opinion
Not only is information on a company's assets available, but information about new techniques to compromise targets is for sale on the dark web.
Thinkstockphotos 637982150

Equinix, Digital Realty, China Mobile...the vendors fuelling the colocation market

Wed, 26th Jul 2017
#
hyperscale
#
dc
#
nextdc
Enterprises with the budgets to build their private facilities are also moving toward colocation facilities for the benefits of rapid deployments.
Thinkstockphotos 101359429

ESET uncovers stealthy Stantinko malware's click fraud prowess

Tue, 25th Jul 2017
#
malware
#
cybersecurity
#
browsers
ESET has spotted a malware strain that tricks users into downloading pirated software from dummy torrent sites.