IT Brief UK - Technology news for CIOs & IT decision-makers

HID stories - Page 46

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Cyber crim

Watch out, there's a new breed of cyber criminal in town

Tue, 12th Apr 2016
#
uc
#
breach prevention
#
symantec
A new class of professional cyber criminals has emerged, adopting corporate practices to increase the efficiency of their attacks.
Ransomware laptop

Ransomware: Locky, TeslaCrypt and other malware families use new tool to evade detection

Tue, 12th Apr 2016
#
malware
#
firewalls
#
network infrastructure
Recently, Palo Alto Networks identified slight changes in Locky detonations through the AutoFocus threat intelligence service.
Students ipad

From SAMR to signage

Wed, 23rd Mar 2016
#
digital signage
#
trilbytv
#
pro av
UK schools miss the mark in using digital signage, with ineffective content and heavy IT systems hampering educational outcomes.
Mobile tv

Analyst opinion: 2016 is not the year of mobile TV

Fri, 11th Mar 2016
#
uc
#
digital entertainment
#
mobile tv
Analysts at MWC 2016 dash hopes of a mobile TV boom: ideal service remains elusive amidst data and monetisation challenges.
Breaking and entering

Android continues to be second most attacked platform, Kaspersky steps in

Thu, 10th Mar 2016
#
uc
#
wearables
#
cybersecurity
Amid rising malware threats against Android, Kaspersky launches a new Internet Security solution integrating Android Wear compatibility.
Fallback

Can one security solution protect two very different people?

Thu, 25th Feb 2016
#
cybersecurity
#
dicker data
#
distributors
Picture two people from a large organisation. They have different needs and completely different levels of access to their network. Can it work?.
Awards

Kiwi firm IntegrationWorks nabs IBM Beacon award

Wed, 17th Feb 2016
#
devops
#
apm
#
software development
This is the first time a company from New Zealand or Australia has won a Beacon award within the category of Outstanding Middleware Solution.
Emotion business analytics

Getting emotional with business analytics

Thu, 11th Feb 2016
#
data analytics
#
martech
#
planning
A quantitative, analytic and evidence-based approach is inhibited by the fact that people are predominantly emotional decision makers.
Update

CyberArk addresses the malware problem

Wed, 3rd Feb 2016
#
malware
#
risk & compliance
#
cybersecurity
CyberArk bolsters defence with Viewfinity v5.5, blending malware protection and user productivity in latest security update.
Article header raas

Ransom32, the Next Step in Ransomware-as-a-Service, explained

Tue, 2nd Feb 2016
#
malware
#
gaming
#
ransomware
The Ransomware-as-a-Service (RaaS) business model is still seeing growth in an industry that is rapidly changing every day.
Firewall security

If opportunity makes a thief, what stops one?

Mon, 25th Jan 2016
#
firewalls
#
network security
#
breach prevention
Cisco's Marc Solomon outlines the questions security professionals should ask when evaluating next-gen firewalls.
Seo

New cyber threat using SEO to target websites

Tue, 19th Jan 2016
#
martech
#
cybersecurity
#
akamai
Akamai Technologies has identified a new cyber threat manipulating SEO with SQL injections, impacting over 3,800 websites and misleading search engine rankings.
Fingerprint

Demand for secure identity solutions grows

Tue, 19th Jan 2016
#
uc
#
wearables
#
cybersecurity
Key trends including ongoing advancements in privacy protection and a more mobile and connected experience will have a big impact on secure identities.
Warning

Cyber security evasion techniques will escalate in 2016

Fri, 4th Dec 2015
#
firewalls
#
network infrastructure
#
network security
Internet of Things (IoT) and cloud will dominate cyber security in 2016, say researchers from Fortinet's threat research division.
Public space

Avoiding the pitfalls of free Wi-Fi

Wed, 25th Nov 2015
#
wireless networks
#
cloud services
#
wifi
Due to ubiquitous adoption of internet enabled mobile devices, consumer demand for 24/7 connectivity has never been greater.
Cloud sec

Trend Micro offers up Deep Security through Azure marketplace

Wed, 4th Nov 2015
#
public cloud
#
dlp
#
microsoft
Trend Micro is offering its Deep Security product through Microsoft's Azure marketplace after joining Microsoft's Enterprise Cloud Alliance.
Stop

Hands-on Review: Norton Security 2015

Tue, 27th Oct 2015
#
gaming
#
digital entertainment
#
cybersecurity
In the bad old days keeping a PC secure was simple. Nowadays, a huge chunk of our lives exists online, and digital security issues have escalated.
Iot security

Enterprise IoT devices underestimated and under-secured

Fri, 16th Oct 2015
#
iot
#
risk & compliance
#
cybersecurity
Alarm over IoT security gap: IT experts claim devices in homes and business are under-protected, despite consumer confidence.
Pou

ESET warns of fake apps bypassing Google Play security

Fri, 9th Oct 2015
#
malware
#
cybersecurity
#
google
Android users have been getting more than they bargained for when downloading some apps, with Google Play security failing to pick up some malware.
Security detection

To thwart attackers, measure what matters

Wed, 30th Sep 2015
#
cybersecurity
#
cisco
#
currencies
Measuring the percentage of blocked attacks remains important, but there's another even more important measurement.