eCommerceNews UK - Technology news for digital commerce decision-makers

HID stories - Page 35

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Control room2

Most organisations exhibiting malicious RDP behaviour - report

Mon, 30th Sep 2019
#
firewalls
#
network infrastructure
#
network security
Remote Desktop Protocol is a vital tool for managed service providers (MSPs) in their management of hundreds of client networks and systems.
Hacker4

Malware hiding on popular content delivery networks - WatchGuard

Mon, 30th Sep 2019
#
malware
#
firewalls
#
network infrastructure
Data also shows Kali Linux modules cracking malware top ten list and a dramatic year-over-year increase in overall malware volume.
Identity and access management6 copy

HID Global acquires PKI-as-a-service solutions provider HydrantID

Tue, 17th Sep 2019
#
iot security
#
iam
#
cybersecurity
HID Global has acquired HydrantID to enhance its PKI-as-a-service offerings, boosting security for enterprise and IoT systems amid rising cyber threats.
Gettyimages 669614252

Popular enterprise printers riddled with security risks

Thu, 15th Aug 2019
#
hp
#
printing
#
brother
Researchers from NCC Group analysed different aspects of six mid-range enterprise printers manufactured by HP, Ricoh, Xerox, Lexmark, Kyocera, and Brother.
Malware1

Banking malware grows 50% while cryptominers decline – Check Point

Thu, 1st Aug 2019
#
malware
#
supply chain
#
cybersecurity
Check Point's mid-year report highlights a 50% rise in mobile banking malware attacks, yet cryptominers see a decline in activity in 2019.
Cybersecurity39

CrowdStrike report lists cybersecurity adversary rankings

Wed, 31st Jul 2019
#
ai security
#
ai
#
cybersecurity
CrowdStrike's latest report highlights the urgent need for speed in cybersecurity, ranking nation-state actors by their breakout times in real-life intrusions.
Access card2

HID Global: Key considerations for secure card issuance

Thu, 25th Jul 2019
#
pam
#
physical security
#
iam
As organisations seek robust secure card issuance solutions, considering modularity, interoperability, and certified quality can streamline provider selection.
Gettyimages 943779298

IoT home connectivity on the up, as are cybersecurity threats

Thu, 18th Jul 2019
#
iot
#
smart home
#
cybersecurity
Nearly 50% of homes in Oceania have IoT devices, but this growing trend also increases security risks, according to a study by Stanford University and Avast.
Gettyimages 1154959038

10 times malware proved that MacOS isn't bulletproof

Mon, 8th Jul 2019
#
malware
#
cybersecurity
#
apple
In the first half of 2019, ten distinct malware threats have targeted macOS, dispelling the myth of its impenetrability, says SentinelOne.
Gettyimages 1007572348

Ping's significant expansion of its cloud identity solution

Wed, 26th Jun 2019
#
mfa
#
iam
#
data privacy
Ping Identity significantly updates PingOne for Customers, enhancing secure push notifications, social login options, SAML support, and EU data compliance.
Screen shot 2019 06 17 at 10

HID Global launches ID verification solution

Mon, 17th Jun 2019
#
iam
#
cybersecurity
#
digital citizenship
HID Global unveils HID goID Simple Verifier, a new device allowing quick, secure age verification via mobile ID, aimed at bars and clubs.
Cybersecurity9

RapidFire Tools helps MSPs and SMBs navigate cybersecurity liability

Mon, 10th Jun 2019
#
cybersecurity insurance
#
it automation
#
kaseya
Many cyber insurance policies require businesses to adhere to specific conditions in order to be paid out if a claim is filed.
Identity and access management7

Cloud-based ID card issuance will reinvent government processes

Thu, 6th Jun 2019
#
firewalls
#
network security
#
physical security
HID Global meets the most demanding requirements for security, quality, and effective program execution in today's most complex ID programs.
Gettyimages 453158039

Nearly half of all employees are willing to share business secrets

Wed, 5th Jun 2019
#
advanced persistent threat protection
#
physical security
#
dlp
Insider threat is real, according to a new report that highlights employee behaviour around sharing corporate information.
Gettyimages 840142776

Why one in three CEOs would fire the person responsible for a breach - Nominet

Tue, 4th Jun 2019
#
breach prevention
#
cybersecurity
#
data breach
One in three CEOs would fire staff responsible for a data breach, finds Nominet's report on the cyber challenges and leadership gaps facing large enterprises.
Identity and access management6 copy

SailPoint launches AI-powered cloud identity platform

Thu, 30th May 2019
#
iam
#
ai
#
cybersecurity
SailPoint Predictive Identity is built on big data and machine learning (ML) technology which enables an AI-driven approach to identity governance.
Cryptojacking2

How to avoid becoming a cryptojacking victim - Bitglass

Tue, 14th May 2019
#
mfa
#
crypto
#
blockchain
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
C9a89095 bc0a 4a40 856f dd8b0c384333

Exclusive: Okta CSO on scaling security alongside business growth

Fri, 3rd May 2019
#
iam
#
cybersecurity
#
okta
Yassir Abousselham shares his unique insights as the chief security officer of a fast-growing identity and access management service provider.
Cybersecurity15

Unisys integrates security into Dell EMC Cyber Recovery

Thu, 2nd May 2019
#
dr
#
network infrastructure
#
partner programmes
Stealth 4.0 gives clients the ability to take immediate action to respond to security incidents, stopping attacks in progress.
Network security6

Aerohive launches guide to cloud-managed network access control

Thu, 25th Apr 2019
#
firewalls
#
network infrastructure
#
network security
NAC for Dummies teaches the key aspects of network access control within enterprise IT networks and how you can secure all devices on the network.