eCommerceNews UK - Technology news for digital commerce decision-makers

HID stories - Page 41

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Thinkstockphotos 905402102

From Dridex to Friedex: Malware creators dabble in ransomware

Wed, 31st Jan 2018
#
malware
#
ransomware
#
cybersecurity
The creators of the Dridex banking Trojan are also responsible for FriedEx (also known as BitPaymer), a ransomware that was discovered in mid-2017.
Fallback

How to stop 'sleeper-agent' hackers from causing havoc

Wed, 24th Jan 2018
#
data analytics
#
siem
#
martech
In an evolving cyber threat landscape, companies pivot from prevention to detection, with 60% of budgets geared towards rapid response, reveals Gartner.
Thinkstockphotos 636705382

Mythbusters: Best of breed HR software vs all-in-one

Mon, 18th Dec 2017
#
saas
#
hcm
#
cybersecurity
Choosing HR software: do you opt for best-of-breed solutions like Cornerstone or all-in-one giants like Oracle? These five myths reveal the pros and cons.
Thinkstockphotos 864458910

Machine learning vs deep learning: what's the difference?

Tue, 12th Dec 2017
#
ai
#
ml
#
opinion
Machine learning and deep learning are transforming tech, but what's the difference? Discover how deep learning powers driverless cars and voice assistants.
Thinkstockphotos 98326934

Initial Coin Offerings: Lack of regulation is a wolf in sheep's clothing, says lawyer

Thu, 7th Dec 2017
#
regulation
#
token sale
#
initial coin offering
Institutional investors warned of hidden traps in ICOs, such as the power shift to founder shareholders. Regulatory uncertainty also a concern.
1 bg norway svalberd

Photo gallery: The world's most extreme data centers

Wed, 29th Nov 2017
#
data analytics
#
hyperscale
#
martech
Negative 40 degrees, this facility is in an environment so cold they have to heat the air used to cool the data center.
Thinkstockphotos 675072744

Cosmologists turn to HPE to tackle some of humanity's toughest questions

Wed, 29th Nov 2017
#
spacetech
#
datacentre infrastructure
#
data analytics
Some of the worlds leading scientists brought together by Stephen Hawking have turned to Intel & HPE to crunch extraordinary amounts of data.
Fallback

Attackers will get in: Three frameworks that help you through ransomware

Wed, 22nd Nov 2017
#
malware
#
ransomware
#
siem
Ransomware will breach networks, but frameworks from NIST, SANS, and the Navy can guide organisations in preparing for and mitigating these attacks.
Thinkstockphotos 515643666

Experts discuss implications of massive Paradise Papers leak

Fri, 10th Nov 2017
#
cybersecurity
#
data leak
#
cybercrime
Leaked Paradise Papers shed light on offshore secrets of the rich and powerful, sparking global debate and security concerns.
Fallback

How to keep your company safe from complex cyber threats

Mon, 6th Nov 2017
#
sonicwall
#
hack
#
computers
An advanced persistent threat is a set of stealthy and continuous computer hacking processes, designed to be evolving, polymorphic and dynamic...
Man directing emails

Number of malicious emails soars 85% from previous quarter

Fri, 27th Oct 2017
#
malware
#
ransomware
#
email security
Proofpoint has released the findings from its massive Quarterly Threat Report – some of which are astonishing.
Thinkstockphotos 840015220

Gartner shares five step plan for a successful data center migration

Thu, 26th Oct 2017
#
virtualisation
#
dr
#
datacentre infrastructure
With respect to risk, Gartner makes a good point: the less there is to move, the easier - and less risky - the migration will be.
Thinkstockphotos 645374702

Locky ransomware is back as one of September's 'most wanted' malware

Mon, 16th Oct 2017
#
malware
#
ransomware
#
cybersecurity
Locky ransomware rises by 11.5% in September, becoming one of 'September's Most Wanted' malware, driven by the Necurs botnet.
Thinkstockphotos 471105110

Credential theft is the hottest trend for cyber attackers in Q2

Fri, 29th Sep 2017
#
firewalls
#
network infrastructure
#
network security
This year cyber attackers have narrowed their focus to methods that involve credential theft, be it through malware, phishing or brute force attacks.
Thinkstockphotos 853416976

What's ahead for ransomware: Seven predictions about its evolution

Mon, 25th Sep 2017
#
malware
#
ddos
#
ransomware
Our sampling has given insight into the future direction of ransomware. Following our analysis, we compiled seven predictions for its evolution.
Lightbulb doorway

Vexata emerges after 3 years in 'stealth mode' to launch revolutionary product

Fri, 22nd Sep 2017
#
storage
#
network infrastructure
#
emc
The company was founded by a flash-storage executive who left Dell EMC in 2013 because he sought to solve an underlying active-data problem.
Thinkstockphotos 645370748

New wave of Locky ransomware appears to come from Vietnam

Fri, 22nd Sep 2017
#
malware
#
firewalls
#
ransomware
Aggressive new Locky ransomware variant traced to Vietnam, with over 27 million attacks observed in a single day by Barracuda researchers.
Fallback

Securing the printing process for a revolution in ID card management

Thu, 21st Sep 2017
#
document management
#
ecm
#
martech
Choosing cards and printers with security in mind can result in durable, multifunction cards less likely to face misuse and tampering.
Thinkstockphotos 467305852

Quann & Claroty strengthen Singapore's critical infrastructure security

Wed, 20th Sep 2017
#
partner programmes
#
breach prevention
#
managed services
Managed security services provider Quann will take on Singapore's critical infrastructure security in partnership with Claroty.
Thinkstockphotos 643567174

ExpensiveWall signs users up to fraudulent SMS services

Tue, 19th Sep 2017
#
malware
#
cybersecurity
#
technology gifts
Android users in the UK have been warned about a strain of malware, called ExpensiveWall, that can lead to fraudulent charges on their accounts.