eCommerceNews Asia - Technology news for digital commerce decision-makers

HID stories - Page 54

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Destiny 2 screenshot 3

Hands-on impressions from the Destiny 2 open beta for consoles

Mon, 24th Jul 2017
#
gaming
#
digital entertainment
#
destiny
An open beta for Destiny 2 happened on both PS4 and Xbox One and it gave us a preview on both the single player campaign and the multiplayer modes.
Thinkstockphotos 684454954

Lights out for the Dark Web: Authorities take down AlphaBay and Hansa marketplaces

Fri, 21st Jul 2017
#
bitdefender
#
cyber criminal
#
dark web
Online criminal marketplaces AlphaBay and Hansa have been taken offline, thanks to a major cooperation effort between Dutch and US authorities.
Thinkstockphotos 57437131

Living off the land: How malware is on the verge of becoming fileless

Thu, 20th Jul 2017
#
malware
#
cybersecurity
#
symantec
'Living off the land' may at first sound like farms and vegetable patches, but it is quickly gaining a new meaning for cyber attackers and threats.
Thinkstockphotos 688600950

Qld RSPCA embraces video conferencing to save animals' lives

Mon, 10th Jul 2017
#
uc
#
avaya
#
animal welfare
The RSPCA in Queensland has used video conferencing technology by Avaya to increase the number of animals it cares for to over 51,000 each year.
Thinkstockphotos 502056875

The three Rs of enterprise security: Rotate, repave, and repair

Mon, 10th Jul 2017
#
gaming
#
advanced persistent threat protection
#
digital entertainment
No organisation regularly repaves their services or applications from a known, good state, leading to vulnerable servers for more than five months.
Expense tracking

How AI will impact invoicing and expense compliance – Concur

Tue, 4th Jul 2017
#
data analytics
#
martech
#
planning
Automated technologies can track spending and analyse attributes, and then identify anomalies and patterns in employee expense reports.
Apple

The doomsayers of Apple

Fri, 23rd Jun 2017
#
apple
#
ipad
#
opinion
Amidst a narrative of decline, Apple jockeys for tech supremacy but faces grumblings over innovation and identity.
Thinkstockphotos 653516378

Arbor Networks digs deep into the Lazarus Group's DDoS attacks

Mon, 19th Jun 2017
#
ddos
#
cybersecurity
#
arbor networks
It is not clear whether the IPs listed in the report were part of a command and control infrastructure or simply bots - or both.
Thinkstockphotos 696924262

How to find out the true value of network risk reduction

Mon, 19th Jun 2017
#
firewalls
#
network infrastructure
#
network security
Networks may make up part of business infrastructure growth, but how do businesses make the most out of any new network & security monitoring tools?.
Thinkstockphotos 692887164

Security training – a vital first step, but not a solution

Thu, 15th Jun 2017
#
edutech
#
phishing
#
email security
Educating employees to protect themselves against phishing and credential theft is necessary, but is it sufficient?.
Thinkstockphotos 502056909

Fortinet: Cybercrime ditches regional targets & goes for global 'element of surprise'

Tue, 13th Jun 2017
#
malware
#
firewalls
#
network infrastructure
According to Fortinet's Global Threat Landscape Report, attackers are always looking for 'the element of surprise'.
Thinkstockphotos 691430076

Top tips to secure your home wifi network from net nasties

Tue, 13th Jun 2017
#
firewalls
#
network infrastructure
#
network security
Your home internet network is become more and more vulnerable. Here's what you can do to help protect it from hackers and other net nasties.
Thinkstockphotos 645215728

Microsoft uncovers how cybercrime gang uses Intel tech for stealth

Tue, 13th Jun 2017
#
malware
#
phishing
#
email security
Microsoft uncovers details about cybercrime group PLATINUM, targeting Southeast Asia through code injection and 'hot patching'.
Thinkstockphotos 653929998

Botnets are being overshadowed by ransomware - in the media, at least

Mon, 12th Jun 2017
#
malware
#
ddos
#
ransomware
Botnets not only harm the owners of infected computers, but others too – they can send out spam, distributing a range of scams or even ransomware.
Thinkstockphotos 470079562

HPE's next frontier: Space travel & memory-driven computing

Fri, 9th Jun 2017
#
semiconductors
#
hpe
#
memory
By 2020, our digital universe will contain nearly as many bits of data as there are stars in the universe, with at least 20 billion mobile devices.
Thinkstockphotos 471634326

Oops, Turla did it again - hackers target Britney Spears' Instagram account

Fri, 9th Jun 2017
#
malware
#
cybersecurity
#
instagram
A backdoor trojan has been lurking in the comment sections of Britney Spears' Instagram posts and the hacking group Turla may be the culprit.
Thinkstockphotos 520168757

Malicious apps discovered on Google Play - some lurking for more than a year

Tue, 30th May 2017
#
malware
#
endpoint protection
#
edr
Check Point, a security software company, has revealed that their researchers discovered another widespread malware campaign on Google Play.
Thinkstockphotos 688089278

Bitdefender takes hypervisor security direct to global data centers

Mon, 29th May 2017
#
virtualisation
#
hyperscale
#
daas
Bitdefender introduces hypervisor-enforced security for cloud and data centres globally, promising enhanced protection against root-level attacks.
Thinkstockphotos 469419470

Forcepoint expands with new cybersecurity analytics & data centre offerings

Fri, 26th May 2017
#
hyperscale
#
dc
#
casb
Forcepoint introduces updated cloud security portfolio, aiming to accelerate secure adoption of cloud applications.
Research

AU government should make 'national interest datasets' available to research - Empired

Fri, 26th May 2017
#
data analytics
#
martech
#
planning
Government and businesses urged to experiment with public and private datasets to uncover value and drive innovation.