How the Pandemic Changed Security Posture & Prioritization
HID Global Blog
by mchandarana
3y ago
Posted:  18 Feb 2021 The global COVID-19 pandemic has significantly impacted life. Entire organizations were forced to work remotely while cybersecurity teams were suddenly adapting to protect mission-critical data and IT environments in new ways. Initially, it was perceived as a temporary impact, which later became a long-term change, causing teams to redefine their cybersecurity strategy. The cyber-attack vector has now expanded to the employee's insecure home networks and devices.   As the threat landscape grows, security professionals face a difficult question: what are the m ..read more
Visit website
How Passive Liveness Enhances the Digital Onboarding Experience
HID Global Blog
by kwilliams
3y ago
Posted:  18 Feb 2021 Verifying the identity of new customers is essential to compliance, regulation and keeping customer and business data safe. Confirming someone’s identity is important across all industries, but particularly essential in the banking and finance sectors. As financial institutions increasingly shift to digital and remote onboarding, the demands of these growing channels must be supported by identity verification technology. One area that has enormous potential is liveness testing, a security and identity management approach that can be used alongside o ..read more
Visit website
Why an Identity Document Should Not Be Used for Payment
HID Global Blog
by fjogandcoulomb
3y ago
Posted:  18 Feb 2021 There have been a number of initiatives to add payment capabilities to ID cards (e.g., Nigeria and Maldives National ID cards), as well as programs where governments have stepped in to provide payment capabilities to their citizens (e.g., a fuel subsidy card in Egypt and digital cash in Ecuador). Three Reasons Why the Combination of Identity and Payment Is Not an Attractive Solution While the potential advantages of multiple-issuer cards have been appealing, the reality has proven less attractive. There are a number of reasons behind this, three of which are menti ..read more
Visit website
The Ultra-Wide Possibilities of Ultra-Wideband
HID Global Blog
by nxp
3y ago
Posted:  10 Feb 2021 Smarter World is a part of The NXP® Podcast, Insights Into Trailblazing Technologies. In this episode, EE Times Editor Nitin Dahad is joined by Charles Dachs, VP & General Manager, Secure Embedded Transactions at NXP Semiconductors, and Ramesh Songukrishnasamy, SVP & CTO at HID Global, to explore UWB’s evolution from a data transfer technology to its new role as a fine ranging technology. Learn how it fits into the connectivity landscape, how consumers will adopt it, the opportunities for exciting new use cases and the importance of standardization. To li ..read more
Visit website
True Crime Stories – DNA Evidence and Identical Twins
HID Global Blog
by stilmann
3y ago
Posted:  09 Feb 2021 On a July evening in 2008 in Duluth, Georgia, 40-year-old Genai Coleman was sitting in her car near a transit station, reading from her bible while waiting for her daughter to finish work. Across the street, a man walked out of a gas station, pointed a gun at her and demanded she get out of the car. Then he shot her, pulled her out of the car and drove away. Genai Coleman did not survive. She was a mother to three adopted children and an experienced elementary school teacher, with plans to open a preschool academy. It was a horrific and senseless crime. The next d ..read more
Visit website
Insider Threats Draw Attention to Zero Trust
HID Global Blog
by ilowe
3y ago
Posted:  02 Feb 2021 How much does your organization spend on cybersecurity? Across industries, average spending on cybersecurity is five to eight percent of the overall technology budget and steadily rising. Yet the cybercrime numbers are shocking: it’s predicted that cybercrime will cost the world in excess of $6 trillion annually by 2021, up from $3 trillion in 2015. While busy protecting the perimeter, we can’t ignore the innate problem of insider threats. Incidents by insiders having skyrocketed 47 percent since 2018 to the tune of $22.45 million. At an average cost of $644,852 t ..read more
Visit website
How to Best Benefit From an e-Passport’s Security
HID Global Blog
by ntrivisas
3y ago
Posted:  02 Feb 2021 Around 50% of the countries that have switched from a non-electronic to an e-Passport (also known as a biometric passport) are not profiting from its new security potential. The reason is that they share the certificates that validate the personal data of a traveler on the e-Passport in a non-efficient manner — and sometimes they do not share at all. These issuing countries risk having made all their efforts in transitioning to an e-Passport in vain. What Happens if You Don’t Manage Your Certificates Effectively? When travelers go through border control, their e-P ..read more
Visit website
How Access Control Tech Empowers the Return to Work
HID Global Blog
by jbarton
3y ago
Posted:  02 Feb 2021 As organizations consider a return to the physical workplace, they must adapt to new requirements, implement new procedures, and leverage technology to alleviate their employees’ concerns. Physical access is a prime area of interest. Crowded entrances, elevators and shared working spaces are obstacles to safe social distancing. Likewise, some security processes, like credentialing, have always relied on face-to-face contact. Access control management can help route employees, in tandem with efforts to stagger work times. Physical access control systems (PACS) can ..read more
Visit website
Boost Operational Efficiency With Managed PKIaaS
HID Global Blog
by mchandarana
3y ago
Posted:  01 Feb 2021 We live in an era of hybrid cloud infrastructure where some IT infrastructure resides on-premises and the majority of the IT resources are hosted in the cloud. However, the strategy to secure those resources and protect data is not the same for cloud resources and on-premise systems. Public Key Infrastructure (PKI) is a proven technology used to secure network devices, IT systems and IoT devices in hybrid infrastructure. The modern PKI deployments are used against a dynamic nature of cyber threats, spanning from phishing attacks, distributed denial of service (DDoS ..read more
Visit website
Finding the UX Sweet Spot for Online Banking
HID Global Blog
by pjones
3y ago
Posted:  27 Jan 2021 Digital banking applications and portals have often had to deal with a dilemma: should access be more secure or more convenient? It has been a difficult needle to thread — more security often led to greater friction for the user, while more convenience exposed their identity and account to theft. Fortunately, it’s getting easier to solve that dilemma. More transparent, user-friendly authentication approaches make it simpler than ever for customers to seamlessly access their information and transact digitally. There’s now little reason for customers to sacrifice th ..read more
Visit website

Follow HID Global Blog on FeedSpot

Continue with Google
Continue with Apple
OR