eCommerceNews Australia - Technology news for digital commerce decision-makers

HID stories - Page 54

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Malware6

Check Point names February's most disruptive malware

Tue, 12th Mar 2019
#
security vulnerabilities
#
coinhive
#
cryptomining
Coinhive tops Check Point's Global Threat Index for February 2019, marking its 15th month as the most disruptive malware despite its impending shutdown.
Access card

Why it's time to move ID card issuance to the cloud

Tue, 12th Mar 2019
#
physical security
#
iam
#
cybersecurity
As traditional ID card issuance methods become outdated and insecure, moving to cloud-based solutions offers increased flexibility, security, and efficiency.
Sara kurfess 794955 unsplash

Cybercriminals earning over $3billion annually exploiting social platforms

Mon, 11th Mar 2019
#
cybersecurity
#
social media
#
cybercrime
Cybercriminals exploiting social media platforms rake in over USD $3 billion annually, a study sponsored by Bromium and led by the University of Surrey reveals.
Network security3

LogRhythm launches solution to address network-borne threats

Mon, 11th Mar 2019
#
firewalls
#
network infrastructure
#
siem
LogRhythm has launched LogRhythm NDR, a new automated network security tool designed to aid understaffed teams in detecting and responding to network threats.
Woman professional copy

Where to from here? Women in cybersecurity speak up

Fri, 8th Mar 2019
#
iwd
#
dei
#
solar power
Women in cybersecurity discuss challenges from gender pay gaps to toxic workplaces on International Women's Day, urging for a more gender-balanced industry.
Petra smith 1

Cloud security: What you need to know before you make the move

Wed, 6th Mar 2019
#
cloud security
#
kordia
#
developer training
As cloud adoption surges, Petra Smith from Aura Information Security shares insights on the benefits, risks, and best practices businesses need to consider.
Hackerr

The cyber kill chain: Moving laterally in Active Directory

Mon, 4th Mar 2019
#
ueba
#
manageengine
#
opinion
Despite robust defences, companies are vulnerable to lateral moves in Active Directory by cybercriminals who exploit social engineering and malware.
Cybersecurity20

New threats on the block: Formjacking, IoT, LotL attacks

Tue, 26th Feb 2019
#
iot security
#
iot
#
iiot
Cybercriminals shift focus from ransomware to formjacking and IoT exploits, with Symantec's latest report revealing tens of millions of dollars in losses.
Lenovo

Lenovo's latest ThinkPads get a security boost

Tue, 26th Feb 2019
#
lenovo
#
amd
#
mobility
Keeping in line with the torrent of product releases coming out of MWC Barcelona this week, Lenovo has added a range of new devices to its ThinkPad family.
Gettyimages 1054573988  1

How automation can eliminate financial errors

Wed, 20th Feb 2019
#
it automation
#
financial systems
#
ai
Nearly all C-level respondents agreed that if inaccuracies in financial data were not identified prior to reporting, the impact would be negative.
Cryptojacking

CSOs - are you prepared for cloud cryptojacking?

Mon, 18th Feb 2019
#
mfa
#
cloud security
#
iaas
A recent report found that almost half of the organisations surveyed have malware in one of their cloud applications.
Malware3

New threat rears its head in new malware report

Thu, 14th Feb 2019
#
malware
#
cybersecurity
#
cryptomalware
Check Point's researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Thinkstockphotos 911053906

Hyundai works with IBM to create a new blockchain-based platform

Thu, 14th Feb 2019
#
uc
#
blockchain
#
martech
The network for commercial financing will supposedly provide participants with a single view of all the transactions happening in the network.
Gettyimages 961970568

IBM opens up Watson to run on anything, anywhere

Wed, 13th Feb 2019
#
uc
#
public cloud
#
martech
IBM opens up Watson AI across any cloud, championing industry-wide transformation by breaking data silos and offering seamless AI integration.
Screen shot 2019 02 11 at 3

Kiwi partner named in HubSpot's global top five

Tue, 12th Feb 2019
#
devops
#
data analytics
#
martech
Hype & Dexter is an Auckland-based agency that specialises in providing organisations with marketing automation solutions.
Thinkstockphotos 484623017

Blame culture only makes data breaches worse

Fri, 8th Feb 2019
#
firewalls
#
network infrastructure
#
network security
Australians must move away from victim-blaming culture in order to improve cybersecurity, says Palo Alto Networks.
Thinkstockphotos 952679588

Melbourne analytics solution provider named IDC Innovator

Fri, 1st Feb 2019
#
data analytics
#
martech
#
planning
Yellowfin, an Australian data analytics solution provider, has been named as one of three Asia/Pacific IDC Innovators.
Thinkstockphotos 1050304142

How an internal chatbot can streamline a business

Wed, 30th Jan 2019
#
uc
#
dr
#
martech
Chatbots have typically been used for customer experience, but AvePoint ANZ believes employees should also benefit from their use.
Wan

How enterprises must transform to survive

Tue, 29th Jan 2019
#
devops
#
digital transformation
#
apm
According to two recent reports from Gartner, there are indications that digital transformation is a priority in 2019.
Cybersecurity17

Carbon Black releases 2019 global threat report

Mon, 28th Jan 2019
#
healthtech
#
carbon black
#
fileless malware
Carbon Black's 2019 Global Threat Report unveils new cyberattack methods fuelled by rising geopolitical tensions, posing significant risks to global industries.