eCommerceNews UK - Technology news for digital commerce decision-makers

HID stories - Page 42

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Screen shot 2017 09 15 at 1

6 months under siege: the malware story so far in 2017

Sat, 16th Sep 2017
#
malware
#
ransomware
#
cybersecurity
Maya Horowitz, Threat Intelligence Group Manager at Check Point explores the major trends in global malware attacks during the first half of 2017.
Thinkstockphotos 98081239

Windows 10 security solutions powerless against 'bashware'

Thu, 14th Sep 2017
#
malware
#
open source
#
cybersecurity
Every security solution on the market may be completely powerless to stop a vulnerability that could allow any malware to bypass Windows 10 systems.
Screen shot 2017 09 12 at 10

Expert spells out how businesses can 'block the spears'

Tue, 12th Sep 2017
#
malware
#
email security
#
cybersecurity
There is no doubt about it, but spear-phishing is big business in 2017 - Menlo Security's Jason Steer explains how businesses can protect themselves.
Thinkstockphotos 837370952

Gemalto hails future of biometrics in ePassports for more efficient travel

Mon, 11th Sep 2017
#
biometrics
#
software development
#
passports
Gemalto's biometric self-service technologies are now being used in ePassports in 30 countries around the world.
Thinkstockphotos 584571668

Are we letting the data race cloud our judgement?

Mon, 4th Sep 2017
#
hybrid cloud
#
data analytics
#
martech
It's a question that has been doing the rounds seemingly forever – how do we keep costs down while keeping our data secure?.
Thinkstockphotos 186211211

Enterprise security: The hidden perils of 'unguarded talk'

Wed, 30th Aug 2017
#
micro focus
#
enterprise security
#
opinion
Some users will share information that seems innocuous, yet can be used by attackers in social engineering attacks. Here are some common examples.
Sharing economy

It's all fun and games in the sharing economy, until the taxes aren't done

Wed, 23rd Aug 2017
#
fintech
#
financial systems
#
tax
The IRD is cracking down on undeclared income and it's very easy for them to see what services a company is offering online.
Thinkstockphotos 831619104

Webroot takes over Securecast in move to take cyber awareness training to mass market

Wed, 16th Aug 2017
#
phishing
#
email security
#
ai security
Webroot has officially acquired security awareness training platform Securecast and has plans to take the new integrated solution to the mass market.
Targeting cyber threats

Cybercrime: What to expect for the rest of 2017 and how to prepare

Wed, 9th Aug 2017
#
malware
#
ddos
#
vpns
​So far this year we have already borne witness to a multitude of serious cybercrime. NordVPN has provided insights for what the second half may hold.
Thinkstockphotos 689019692

Zscaler reports spike in malware families abusing SSL/TLS encryption as part of infection chain

Fri, 4th Aug 2017
#
malware
#
encryption
#
martech
Cyber attacks that use two common forms of encryption are on the rise, with the amount of malicious content doubling in the last six months alone.
Cybercriminall

The Dark Web: Is your company at risk?

Thu, 27th Jul 2017
#
risk & compliance
#
cybersecurity
#
opinion
Not only is information on a company's assets available, but information about new techniques to compromise targets is for sale on the dark web.
Thinkstockphotos 101359429

ESET uncovers stealthy Stantinko malware's click fraud prowess

Tue, 25th Jul 2017
#
malware
#
cybersecurity
#
browsers
ESET has spotted a malware strain that tricks users into downloading pirated software from dummy torrent sites.
Thinkstockphotos 57437131

Living off the land: How malware is on the verge of becoming fileless

Thu, 20th Jul 2017
#
malware
#
cybersecurity
#
symantec
'Living off the land' may at first sound like farms and vegetable patches, but it is quickly gaining a new meaning for cyber attackers and threats.
Thinkstockphotos 502056875

The three Rs of enterprise security: Rotate, repave, and repair

Mon, 10th Jul 2017
#
gaming
#
advanced persistent threat protection
#
digital entertainment
No organisation regularly repaves their services or applications from a known, good state, leading to vulnerable servers for more than five months.
Thinkstockphotos 696924262

How to find out the true value of network risk reduction

Mon, 19th Jun 2017
#
firewalls
#
network infrastructure
#
network security
Networks may make up part of business infrastructure growth, but how do businesses make the most out of any new network & security monitoring tools?.
Thinkstockphotos 692887164

Security training – a vital first step, but not a solution

Thu, 15th Jun 2017
#
edutech
#
phishing
#
email security
Educating employees to protect themselves against phishing and credential theft is necessary, but is it sufficient?.
Thinkstockphotos 470079562

HPE's next frontier: Space travel & memory-driven computing

Fri, 9th Jun 2017
#
semiconductors
#
hpe
#
memory
By 2020, our digital universe will contain nearly as many bits of data as there are stars in the universe, with at least 20 billion mobile devices.
Thinkstockphotos 645370748

The need for internet security on your devices

Mon, 29th May 2017
#
malware
#
ransomware
#
endpoint protection
As cybercrime costs Kiwis over £257m annually, securing your devices with robust internet security is crucial to thwart hackers.
Thinkstockphotos 469419470

Forcepoint expands with new cybersecurity analytics & data centre offerings

Fri, 26th May 2017
#
hyperscale
#
dc
#
casb
Forcepoint introduces updated cloud security portfolio, aiming to accelerate secure adoption of cloud applications.
Virtual brain power

HPE unveils 160TB memory-driven computing 'Machine' built for big data

Wed, 17th May 2017
#
hpe
HPE has unveiled the world's largest single-memory computer – all 160 terabytes of it - as it looks to create a new technology paradigm.