eCommerceNews UK - Technology news for digital commerce decision-makers

HID stories - Page 37

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Cryptojacking3

Malware downloader on the rise in Check Point's latest Threat Index

Wed, 16th Jan 2019
#
malware
#
cybersecurity
#
report
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
Thinkstockphotos 491168784

Carbon Black: What does cybersecurity have in store for 2019?

Wed, 16th Jan 2019
#
supply chain
#
cybersecurity
#
healthtech
As geopolitical tensions rise, Carbon Black forecasts an increase in destructive cyber attacks, sophisticated counter-detection, and extortion tactics in 2019.
Thinkstockphotos 514469972

Encryption app to help travellers secure their devices

Thu, 10th Jan 2019
#
encryption
#
data privacy
#
immigration
Researchers in the UK are developing an app called 'Shatter Secrets' to help travellers protect their digital information from border control agents.
Screen shot 2018 12 10 at 8

Golden opportunities for enterprise e-waste reduction

Mon, 10th Dec 2018
#
uc
#
datacentre infrastructure
#
hyperscale
As e-waste volumes surge past 50 million tonnes globally, businesses face pressure to improve technology asset management and embrace recycling efforts.
Cybersecurity7

Juniper simplifies data integration to improve threat detection

Thu, 6th Dec 2018
#
advanced persistent threat protection
#
juniper networks
#
threat detection
Updates to the Juniper Advanced Threat Prevention Appliances leverage third-party firewalls and security data sources.
Hackerr

FBI disrupts multiple botnets as part of anti-fraud operation

Thu, 29th Nov 2018
#
malware
#
cybersecurity
#
botnet
The FBI, with the help of F-Secure, has dismantled the 3ve ad fraud ring that manipulated traffic from 1.7 million IPs, generating USD $30 million in revenue.
Thinkstockphotos 1000857902

HID Global brings high authentication to mobile

Thu, 29th Nov 2018
#
endpoint protection
#
iam
#
edr
The company's new offering brings the security of physical authentication to Android and iOS with near-field communication technology.
Server2

Norton VPN adds New Zealand server

Wed, 28th Nov 2018
#
vpns
#
endpoint protection
#
datacentre infrastructure
The new local server will help users protect personal information and securely access private information while on the go.
Thinkstockphotos 949208194

GCSB names Women in STEM scholarship winners

Tue, 27th Nov 2018
#
gcsb
#
stem
#
girls in stem
The GCSB has awarded three NZD $10,000 Women in STEM scholarships, aiming to boost diversity in STEM fields and reduce the gender pay gap.
Network security copy

Is your SD-WAN solution leaving you vulnerable?

Mon, 26th Nov 2018
#
firewalls
#
network infrastructure
#
sd-wan
Providing direct internet access to cloud-based applications has made deploying new security strategies designed for the distributed enterprise critical.
Thinkstockphotos 917602456

Phishing: It's all too easy on mobile devices

Thu, 22nd Nov 2018
#
endpoint protection
#
phishing
#
email security
Phishing attacks are surging on mobile devices, with 56% of users last year falling prey. Yet, firms like Lookout are stepping up with robust defences.
Thinkstockphotos 901677582

WatchGuard's eight (terrifying) 2019 security predictions

Fri, 16th Nov 2018
#
malware
#
uc
#
firewalls
The next evolution of ransomware, escalating nation-state attacks, biometric hacking, Wi-Fi protocol security, and Die Hard fiction becomes reality.
Screen shot 2018 10 30 at 3

Case study: Startup revamps systems with HID mobile access

Thu, 8th Nov 2018
#
case study
#
mobility
#
mobile apps
French startup Deskopolitan has chosen to work with HID Global solutions to improve its co-working spaces and offer innovative experiences to clients.
Thinkstockphotos 946716946

Are you selling benefits or advantages?

Mon, 5th Nov 2018
#
partner programmes
#
sales
#
opinion
Channel expert Moheb Moses explains how this terminology can help a salesperson to focus on meeting client's needs rather than pushing a product.
Bunker

Carbon Black: Is your cyber panic room ready?

Fri, 5th Oct 2018
#
carbon black
#
opinion
#
cybersecurity strategy
Cybersecurity expert warns of a 'cyber winter' with a surge in destructive attacks, urging digital 'panic rooms'.
Thinkstockphotos 635719038

Conspiracy looms: NSS Labs takes CrowdStrike, ESET, Symantec & AMTSO to court

Thu, 27th Sep 2018
#
malware
#
ai security
#
ai
NSS Labs is suing CrowdStrike, ESET, Symantec, and AMTSO, alleging they conspired to boycott independent security tests to hide flaws in their products.
Vitally

Exclusive: The white hat hackers making sure your internet stays safe

Thu, 27th Sep 2018
#
uc
#
kaspersky
#
kaspersky cyber security weekend
Kaspersky's GReAT team director, Vitaly Kamluk, discusses the current state of cyber security and the future of the internet.
Cybersecurity3 copy

Gartner names Sophos leader in Unified Threat Management

Mon, 24th Sep 2018
#
firewalls
#
network infrastructure
#
network security
Sophos has been named a leader in Gartner's Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls).
Thinkstockphotos 673819080

Brewery breach: Not even beer is safe from ransomware

Sat, 22nd Sep 2018
#
malware
#
ransomware
#
breach prevention
There were no pints enjoyed at this Scottish brewery this week as it fell victim to a crippling ransomware attack.
Global cloud

Why the Lazarus group poses a massive threat to businesses

Fri, 21st Sep 2018
#
supply chain
#
kaspersky
#
kaspersky cyber security weekend
Heightened cyberheist activity by the notorious Lazarus group could give rise to more fake supply chain attacks.