eCommerceNews Asia - Technology news for digital commerce decision-makers

HID stories - Page 60

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Thinkstockphotos 480206837

Five technologies ready to disrupt your business

Tue, 21st Jun 2016
#
iot
#
ar, vr & metaverse
#
apps
Personal technologies are set to have a major impact on every business across the globe, according to Gartner.
Trojan attack

New Sofacy attacks against US government agency

Wed, 15th Jun 2016
#
firewalls
#
network infrastructure
#
network security
Recently, Unit 42 identified a spear phishing e-mail from the Sofacy group that targeted the United States government - here is a rundown.
Thinkstockphotos 527681858

McAfee report: Mobile collusion app attacks on the rise, W32/Pinkslipbot Trojan back

Wed, 15th Jun 2016
#
malware
#
ransomware
#
casb
McAfee Labs Threats Report: June 2016 shows that mobile app collusion and the W32/Pinkslipbot Trojan are the biggest cyber threats lurking.
Thinkstockphotos 463151329

Windows flaw enhances DNS hijacking

Tue, 7th Jun 2016
#
malware
#
cybersecurity
#
microsoft
ESET discovers new version of DNS Unlocker with sneaky capabilities to re-configure DNS settings on victims' computers.
Cyber

A modern solution for a modern problem: IBM tackles cyber security

Tue, 31st May 2016
#
edutech
#
data analytics
#
martech
IBM unveils Watson for Cyber Security, leveraging cognitive tech and collaboration with top US universities to tackle modern cyber threats.
Customer service 2

A happy customer: Conbrio solving problems with top-notch customer service

Mon, 23rd May 2016
#
crm
#
uc
#
martech
Kiwi tech company Conbrio, known for stellar customer service, has streamlined operations for Telnet, a leading NZ contact centre since 1996.
Change

Digital services and technology vendors forced to change approach

Fri, 20th May 2016
#
martech
#
marketing
#
tbr
Digital marketing services and technology vendors are having to adapt their campaigns as customer demand changes, says a report by Technology Business Research.
Man directing emails

How safe are your emails? An expert breakdown

Thu, 12th May 2016
#
ddos
#
cybersecurity
#
email
Since the concept of email was first floated in the 60s, it has exploded onto the scene, becoming an absolutely crucial part of everyday business.
Cloud infrastructure1

Cloud infrastructure services market booming; AWS leads way

Mon, 9th May 2016
#
paas
#
hyperscale
#
public cloud
Data centers providing cloud infrastructure services will take up over 50% of servers shipped in 2016 but there's an impact for vendors and channel.
Leak

Cyber threats coming from the inside

Thu, 21st Apr 2016
#
cybersecurity
#
solarwinds
#
solar power
IT security awareness among business leaders, especially in government, is increasing due to company data leaks, says SolarWinds.
Opportunity1

New Igel all-in-one thin client offers new markets for resellers

Wed, 20th Apr 2016
#
daas
#
cloud workspace
#
igel
Igel has released a new version of its UD9 all-in-one thin client, offering resellers 'a new point of entry to several markets'.
Secure network2

How can you secure your enterprise network?

Wed, 20th Apr 2016
#
firewalls
#
network infrastructure
#
network security
Enterprises face dire cyber threats, but Fortinet's Gary Gardiner reveals a robust, layered defence is key to safeguarding network security.
Man choosing padlock

Fortinet's Advanced Threat Protection: Securing your datacentre

Fri, 15th Apr 2016
#
firewalls
#
network infrastructure
#
hyperscale
Fortinet's ATP framework provides multi-layered defence-in-depth for your datacentre and fights back against malware and other threats.
Cyber crim

Watch out, there's a new breed of cyber criminal in town

Tue, 12th Apr 2016
#
uc
#
breach prevention
#
symantec
A new class of professional cyber criminals has emerged, adopting corporate practices to increase the efficiency of their attacks.
Ransomware laptop

Ransomware: Locky, TeslaCrypt and other malware families use new tool to evade detection

Tue, 12th Apr 2016
#
malware
#
firewalls
#
network infrastructure
Recently, Palo Alto Networks identified slight changes in Locky detonations through the AutoFocus threat intelligence service.
Hp spectre product

The new HP changes gear with world's thinnest laptop introduction

Fri, 8th Apr 2016
#
hp
#
pc hardware
#
notebook
HP has produced a beautiful and sexy laptop, knocking the previous 'thinnest laptop' record out of the park with the all new Spectre.
Republique 01

Review: Republique sneaks onto the PS4

Wed, 6th Apr 2016
#
gaming
#
digital entertainment
#
ps4
Republique is a stealth-based video game that came out on Steam just a couple of months ago. Now the game has sneaked its way to the PS4.
Ency

Encryption: the blindspot in enterprise security

Thu, 31st Mar 2016
#
encryption
#
ixia
#
web browsing
Encryption creates a security blind spot in organisations, allowing hackers to propagate hidden malware, says Ixia.
Students ipad

From SAMR to signage

Wed, 23rd Mar 2016
#
digital signage
#
trilbytv
#
pro av
UK schools miss the mark in using digital signage, with ineffective content and heavy IT systems hampering educational outcomes.
Emoj

There's a secret Emoji keyboard hidden in your iPhone

Fri, 11th Mar 2016
#
apple
#
apple iphone
#
emoji
iPhone users can unlock a hidden treasure trove of over 100 new emoticons by enabling the Japanese Kana keyboard. Here's how to access them.