eCommerceNews Asia - Technology news for digital commerce decision-makers

HID stories - Page 61

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Mobile tv

Analyst opinion: 2016 is not the year of mobile TV

Fri, 11th Mar 2016
#
uc
#
digital entertainment
#
mobile tv
Analysts at MWC 2016 dash hopes of a mobile TV boom: ideal service remains elusive amidst data and monetisation challenges.
Breaking and entering

Android continues to be second most attacked platform, Kaspersky steps in

Thu, 10th Mar 2016
#
uc
#
wearables
#
cybersecurity
Amid rising malware threats against Android, Kaspersky launches a new Internet Security solution integrating Android Wear compatibility.
Danger

Warning: Android malware targeting NZ and Aus bank apps

Thu, 10th Mar 2016
#
malware
#
fintech
#
cybersecurity
Android malware dupes NZ and Aus bank customers into revealing app login details, enabling thieves to rob accounts remotely.
Quantum break logo

Interview: Speaking Quantum Break with Thomas Puha

Thu, 10th Mar 2016
#
gaming
#
quantum computing
#
digital entertainment
Netguide had a chance to speak with Remedy Games' PR Thomas Puha about the studio's upcoming new game Quantum Break.
2

Hands-on Review: Corsair 600, 400 and Spec-Alpha Cases

Thu, 10th Mar 2016
#
gaming
#
digital entertainment
#
corsair
The latest cases from Corsair are among the best choices for anyone building a middle or high-performance computer.
Dying light

Is Dying Light: The Following Enhanced Edition worth a look?

Mon, 7th Mar 2016
#
gaming
#
digital entertainment
#
dying light
It's time, once again to run, jump and hide from the zombie horde in Techland's Dying Light: The Following Enhanced Edition.
Security

Cloud app security high priority for businesses

Thu, 3rd Mar 2016
#
dlp
#
cybersecurity
#
google
Trend Micro expands Cloud App Security to Box, Dropbox and Google Drive to enhance content security against cyber attacks.
Vintage telephone

Embrace VoIP and help customers escape the clutches of large telcos

Thu, 3rd Mar 2016
#
uc
#
conversant
#
partners
Rescuing customers from the high cost and inflexibility of traditional telecommunications services presents IT resellers with great new opportunities.
Customer ex

CX solutions a 'substantial' opportunity, says new report

Tue, 1st Mar 2016
#
cx
#
martech
#
marketing
Demand for customer experience solutions is on the rise, according to new research from Technology Business Research.
Trojan

Porn Trojan rampant on Google Play store

Fri, 26th Feb 2016
#
malware
#
cybersecurity
#
google
Porn clicker-type malicious apps disguised as legitimate apps are widespread on the Google Play store, researchers say.
Fallback

Can one security solution protect two very different people?

Thu, 25th Feb 2016
#
cybersecurity
#
dicker data
#
distributors
Picture two people from a large organisation. They have different needs and completely different levels of access to their network. Can it work?.
Ransom

Ransomware on the rise in Aus and NZ, ESET says

Wed, 24th Feb 2016
#
malware
#
ransomware
#
cybersecurity
Ransomware on Joomla domains is a growing security threat, warns ESET, as the firm reports a rise in attacks in Australia and New Zealand.
Laptop virus

New Android Trojan “Xbot” phishes credit cards and bank accounts, encrypts devices for ransom

Tue, 23rd Feb 2016
#
cybersecurity
#
trojan
#
opinion
A new Trojan called Xbot is targeting Android users in Russia and Australia, stealing banking credentials and demanding a ransom.
Gettyimages 508316218

Hate Valentine's? We show you how to block the soppy crap

Fri, 12th Feb 2016
#
facebook
#
social media
#
x
Hide, unblock or unfriend any exes or former love interests whose happiness is going to make you depressed, angsty and listen to Kelly Clarkson.
Emotion business analytics

Getting emotional with business analytics

Thu, 11th Feb 2016
#
data analytics
#
martech
#
planning
A quantitative, analytic and evidence-based approach is inhibited by the fact that people are predominantly emotional decision makers.
Cloud in hands

StorageCraft and NextDC launch Sydney disaster recovery cloud

Wed, 3rd Feb 2016
#
storage
#
dr
#
hyperscale
StorageCraft and data center-as-a-service provider NextDC have teamed up to offer a backup and disaster recovery service, hosted in Sydney.
Update

CyberArk addresses the malware problem

Wed, 3rd Feb 2016
#
malware
#
risk & compliance
#
cybersecurity
CyberArk bolsters defence with Viewfinity v5.5, blending malware protection and user productivity in latest security update.
Article header raas

Ransom32, the Next Step in Ransomware-as-a-Service, explained

Tue, 2nd Feb 2016
#
malware
#
gaming
#
ransomware
The Ransomware-as-a-Service (RaaS) business model is still seeing growth in an industry that is rapidly changing every day.
Review screenshot 1 1453741364

The Witness PS4 Review: Hard yet very beautiful

Fri, 29th Jan 2016
#
gaming
#
digital entertainment
#
the witness
Game designer, Jonathan Blow, may have designed one of the hardest games he's ever made with The Witness. Despite its difficulty, it looks great.
Firewall security

If opportunity makes a thief, what stops one?

Mon, 25th Jan 2016
#
firewalls
#
network security
#
breach prevention
Cisco's Marc Solomon outlines the questions security professionals should ask when evaluating next-gen firewalls.