eCommerceNews Australia - Technology news for digital commerce decision-makers

HID stories - Page 71

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Fallback

Hands-on Review: Viewsonic XG2703-GS - the whole package

Thu, 15th Dec 2016
#
gaming
#
digital signage
#
digital entertainment
This is a decent gaming monitor with a very high refresh rate that would work great with a high-end PC for the ultimate gaming package.
Nidal

Avaya boss talks rumours, buy-outs, bankruptcy and the future of Avaya

Tue, 13th Dec 2016
#
uc
#
avaya
#
contact centre
Avaya International boss Nidal Abou-Ltaif tells customers and partners the vendor is bullish and confident as it continues to forge a new path.
Thinkstockphotos 160426839

'Avalanche Network' botnet hideout busted; ESET offers cleanup help

Tue, 13th Dec 2016
#
malware
#
cybersecurity
#
botnet
Cybercriminal activity hub Avalanche Network has been busted by law enforcement agencies, ending a long reign of protection for botnet operators.
Thinkstockphotos 499096877

Webroot sheds light on the short, sharp lifecycle of phishing websites

Mon, 12th Dec 2016
#
phishing
#
email security
#
ai security
84% of phishing sites exist for less than 24 hours. The average life cycle is less than 15 hours. But 400,000 phishing sites are appearing each month.
Thinkstockphotos 622311188

Malicious exploit kit targeting Internet Explorer users, on global scale

Mon, 12th Dec 2016
#
malware
#
cybersecurity
#
banking
ESET uncovers 'Stegano', a devious exploit kit victimising Internet Explorer users globally through high-traffic site ads.
Thinkstockphotos 488868051

5 types of workers to drive the digital workplace

Thu, 8th Dec 2016
#
workplace
#
analyst report
As digital workplaces evolve, Gartner identifies five worker types – Engineers, Mavericks, Pilots, Caretakers, Navigators – each crucial for future success.
Thinkstockphotos 488874360

ESET discovers a new decryption tool for Crysis ransomware

Tue, 6th Dec 2016
#
malware
#
ransomware
#
cybersecurity
ESET has launched a free decryption tool for victims of Crysis ransomware, offering a solution to recover encrypted files without paying a ransom.
Shield platform

Salesforce Shield offers superior level of data security

Tue, 6th Dec 2016
#
data protection
#
data analytics
#
martech
Introducing Salesforce Shield. Launched in July, it was built to help customers see the who, what and where information about sensitive data access.
Thinkstockphotos 472054044

Cyber attacks: A growing risk for healthcare professionals

Mon, 5th Dec 2016
#
cybersecurity
#
healthtech
#
gemalto
Why is the healthcare industry becoming such a popular target for hackers and data thieves? To put it simply, the answer is in the data.
Thinkstockphotos 511068126

Healthcare organisations in the crosshairs of Gatak

Mon, 28th Nov 2016
#
malware
#
advanced persistent threat protection
#
cybersecurity
The group behind the Gatak Trojan (Trojan.Gatak) continues to pose a threat with the healthcare sector heavily affected by attacks.
Thinkstockphotos 484125606

DDoS: A decoy to the back door, survey finds

Wed, 23rd Nov 2016
#
ddos
#
kaspersky
#
threat landscape
Survey finds DDoS attacks are often a cover for more nefarious cyber activities, with over half of firms targeted.
Peter chidiac avaya

Avaya eyes smart cities initiatives as local growth soars

Fri, 18th Nov 2016
#
smart cities
#
healthtech
#
avaya
Hard on the heels of its biggest quarter in ANZ in three years, Avaya is eyeing up the smart cities opportunities for itself and its partners.
Hitman the complete first season artwork 12 1476264799

Hitman season one draws to a close

Thu, 10th Nov 2016
#
gaming
#
hyperscale
#
public cloud
The latest Hitman game's episodic first season draws to a close with the release of the Japan-set sixth episode, Situs Inversus.
Digital globe8

What the U.S election means for the tech sector

Wed, 9th Nov 2016
#
healthtech
#
apple
#
facebook
As the U.S. election looms, the tech sector braces for the impact of policies by future POTUS on innovation and growth.
Thinkstockphotos 519824594

Bad customer service as a tool to distract from bad business

Wed, 9th Nov 2016
#
crm
#
cx
#
martech
Bad customer service may not just be poor training, but a deliberate shield for systemic business flaws, a troubling report suggests.
Thinkstockphotos 609064938

Smart home vulnerability: Tips for staying internet secure

Wed, 2nd Nov 2016
#
surveillance
#
smart home
#
cybersecurity
Security is only as effective as the weakest link. Therefore, it is important to secure you entire home network and the devices that connect to it.
Edge01

Avaya aims for a new edge with updated partner program

Wed, 2nd Nov 2016
#
avaya
#
partners
#
mapp
Avaya has streamlined its Edge partner program and added 'greater benefits' as the company's focus shifts increasingly to software and services.
Thinkstockphotos 476232436

Vendors upping their recruitment game to stay ahead in the DX arms race

Tue, 1st Nov 2016
#
digital transformation
#
it automation
#
tbr
IT services vendors are hiring staff with multidisciplinary skills to support hybrid IT environments, says TBR report.
Thinkstockphotos 472704268

Tech support scams now hide code to mask malicious intent

Fri, 28th Oct 2016
#
email security
#
cybersecurity
#
symantec
Symantec discovers another tech support scam that uses scare tactics to fool users into believing they're infected with a virus.
Kv1 0uj6f46

Hands-on Review: Asus Chromebit CS10 - a portable PC

Thu, 27th Oct 2016
#
gaming
#
digital entertainment
#
mobility
This incredible little USB-sized device has been made to turn your monitor into a mini PC and was designed for your cloud applications.