eCommerceNews Australia - Technology news for digital commerce decision-makers

HID stories - Page 46

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Gettyimages 1197070949

Surge in encrypted malware prompts warning about detection strategies

Mon, 29th Jun 2020
#
firewalls
#
network infrastructure
#
encryption
Massive surge in malware delivery over encrypted connections, with 67% of all malware delivered via HTTPS, says WatchGuard report.
Browser history

APAC parents hide internet activity from children more than cyber attackers

Fri, 26th Jun 2020
#
cybersecurity
#
history
#
kaspersky
A Kaspersky study reveals APAC parents are more concerned about their children accessing their private online information than cybercriminals.
Handshake2

Keyfactor and Primekey announce partnership to automate PKI

Wed, 24th Jun 2020
#
multi-cloud
#
risk & compliance
#
cybersecurity
Keyfactor and Primekey have partnered to simplify and automate public key infrastructure (PKI) for large-scale enterprise and IoT deployments.
Gettyimages 824294832

UPDATED: F5 being sued by company that claims to own NGINX

Mon, 22nd Jun 2020
#
f5 networks
#
lawsuit
#
m&a
The company that came out of the woodwork when F5 acquired NGINX last year has appointed an investment company to pursue legal action in the US.
Cybersecurity breach

In IT security, 'good enough' is no longer good enough

Thu, 18th Jun 2020
#
malware
#
phishing
#
email security
Cyber attackers live by the motto 'Never let a good crisis go to waste', and COVID-19 delivers a perfect storm of opportunity for them.
Mobile security

Ransomware attacks swell, average ransom payments rise - report

Wed, 10th Jun 2020
#
malware
#
virtualisation
#
vpns
Ransomware attacks are escalating as the average ransom payment hits USD $18,000, with 57% of companies capitulating to demands, a report reveals.
The last of us part 2 sop sep screen 02 ps4 en 25sep19 1569406887077

Hands-on preview: The Last of Us Part II

Mon, 8th Jun 2020
#
gaming
#
digital entertainment
#
the last of us
Stealth is also an important technique to perfect in this sequel because racing head-on to kill enemies will always lead to Ellie's death.
Close up key keyboard 39389

DNS recursive resolvers vulnerability can launch DDoS attacks against any victim

Fri, 5th Jun 2020
#
ddos
#
radware
#
cyber attacks
A newly discovered vulnerability in DNS resolvers, dubbed NXNSAttack, enables cybercriminals to launch highly amplified DDoS attacks, warns Radware.
Gettyimages 1129068270

Five wine-tasting tips that should be applied to network security

Mon, 25th May 2020
#
firewalls
#
network infrastructure
#
data analytics
Applying wine-tasting strategies to network security offers novel insights. Discover five tips to better identify network vulnerabilities and threats.
Gettyimages 1173158404

Pega strives to rid AI-based CX systems of discrimination

Thu, 21st May 2020
#
crm
#
cx
#
martech
The check is designed to flag possible discriminatory messages created by AI before those messages reach the customer.
Mc

Minecraft adds five new worlds to RTX beta on Windows 10

Wed, 20th May 2020
#
gaming
#
digital entertainment
#
minecraft
Italian-inspired villages, underground lairs, medieval realms and overgrown forests - there's plenty to explore.
Cyber crime   financial

Digital heists: Attacks on financial institutions rise 238% in 3 months

Mon, 18th May 2020
#
malware
#
virtualisation
#
ddos
Cyber attacks on financial institutions soared by 238% from February to April, as reported by VMware Carbon Black. 80% of entities noted higher attack rates.
F5769a2e 1436 481d b0f4 edf1d68e5df d10c9bc7 6101 42c1 bc10 ed184e5114db prv

NVIDIA announces new Mellanox SmartNIC for the modern data center

Fri, 15th May 2020
#
ethernet
#
nvidia
#
cloud data center
NVIDIA launches Mellanox SmartNIC, ConnectX-6 Lx, for modern data centres, delivering up to 50Gb/s and boosting security, accelerating workflows.
Gettyimages 1182604339

HID Global and Keyfactor team up for zero-trust security

Tue, 12th May 2020
#
malware
#
risk & compliance
#
zero trust security
HID Global and Keyfactor join forces to enhance data security with their new solution, combining digital certificates and zero-trust security.
Gettyimages 1216822479

VPN provider Hide My Ass promises no more user logging

Mon, 11th May 2020
#
vpns
#
data privacy
#
location tracking
HMA (Hide My Ass; the VPN provider owned by Avast, is launching a new 'no logging policy (NLP)' to enhance user privacy.
Asus

Hands-on Review: The ROG STRIX Go 2.4 headset has it all

Mon, 11th May 2020
#
gaming
#
digital entertainment
#
rog
With the ROG STRIX Go 2.4, you virtually own two completely different headsets for the price of one, and switch simply by attaching the 3.5mm cable.
Cybersecurity key

CenturyLink launches solution to combat insider threats

Fri, 8th May 2020
#
cybersecurity
#
centurylink
#
insider threats
The solution employs behavioural analytics algorithms to find malicious user activities and automates the review of privileged account activities.
610 5400

Why AI and ML are increasingly important for effective IT security

Thu, 7th May 2020
#
siem
#
ueba
#
risk & compliance
ML offers much better capabilities than humans can deliver when it comes to recognising and predicting certain types of patterns.
Gettyimages 952777456

Three ways to protect your business in the cloud

Fri, 24th Apr 2020
#
firewalls
#
network security
#
mfa
A modern BYO-anything workforce means more access points, hidden apps and hurdles to secure across the organisation.
Gettyimages 628483752

Malwarebytes launches VPN service that won't track users

Fri, 24th Apr 2020
#
vpns
#
encryption
#
cybersecurity
Malwarebytes says that while the solution is only available for Windows, it will be coming soon to Mac, Android, Chrome, and iOS.