TelcoNews Asia - Telecommunications news for ICT decision-makers

HID stories - Page 62

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Seo

New cyber threat using SEO to target websites

Tue, 19th Jan 2016
#
martech
#
cybersecurity
#
akamai
Akamai Technologies has identified a new cyber threat manipulating SEO with SQL injections, impacting over 3,800 websites and misleading search engine rankings.
Fingerprint

Demand for secure identity solutions grows

Tue, 19th Jan 2016
#
uc
#
wearables
#
cybersecurity
Key trends including ongoing advancements in privacy protection and a more mobile and connected experience will have a big impact on secure identities.
Benq speaker

Hands-on Review: BenQ Trevolo Bluetooth speaker

Fri, 15th Jan 2016
#
gaming
#
digital entertainment
#
bluetooth
Where other makers have opted for simplistic designs, BenQ pushed the boat out when it came to the Trevolo Bluetooth speaker.
Computer virus

FortiGuard Labs: IoT attacks and new evasion techniques will characterise emerging threats in 2016

Mon, 11th Jan 2016
#
firewalls
#
network infrastructure
#
network security
As 2016 approaches, the threat landscape is as dynamic as ever with significant trends in malware and network security becoming more important.
Warning

Cyber security evasion techniques will escalate in 2016

Fri, 4th Dec 2015
#
firewalls
#
network infrastructure
#
network security
Internet of Things (IoT) and cloud will dominate cyber security in 2016, say researchers from Fortinet's threat research division.
Public space

Avoiding the pitfalls of free Wi-Fi

Wed, 25th Nov 2015
#
wireless networks
#
cloud services
#
wifi
Due to ubiquitous adoption of internet enabled mobile devices, consumer demand for 24/7 connectivity has never been greater.
Lightbulb what a surprise

Intelligent data can save you money: Find out how

Tue, 17th Nov 2015
#
data analytics
#
martech
#
planning
Using data intelligently can transform businesses - for one, corporate spend data can become actionable insights that helps a business save money.
Encryption inspection

Using ADCs to uncover hidden threats in encrypted traffic

Mon, 9th Nov 2015
#
dlp
#
healthtech
#
a10 networks
A10's Greg Barnes offers up some tips on uncovering hidden threats in encrypted traffic, with application delivery controllers.
Kkc

Windows desktop and persona migration with speed – KKC

Thu, 5th Nov 2015
#
kkc
#
desktop migration
#
banking
KKC after recently announcing their partnership with Tranxition was an exhibitor in the Emerging Technology Section at Gartner's Symposium for CIO's.
Cloud sec

Trend Micro offers up Deep Security through Azure marketplace

Wed, 4th Nov 2015
#
public cloud
#
dlp
#
microsoft
Trend Micro is offering its Deep Security product through Microsoft's Azure marketplace after joining Microsoft's Enterprise Cloud Alliance.
Battery

The apps sucking the life out of your phone

Tue, 27th Oct 2015
#
power / energy
#
cloud services
#
avg technologies
The latest report from AVG Technologies reveals what the top apps are for draining battery life on Android devices.
Stop

Hands-on Review: Norton Security 2015

Tue, 27th Oct 2015
#
gaming
#
digital entertainment
#
cybersecurity
In the bad old days keeping a PC secure was simple. Nowadays, a huge chunk of our lives exists online, and digital security issues have escalated.
Iot

Hidden insights within Internet of Things data

Tue, 20th Oct 2015
#
data analytics
#
martech
#
iot
Teradata launches Teradata Listener and Aster Analytics on Hadoop to help businesses tap into the hidden insights of IoT data, transforming operations.
Iot security

Enterprise IoT devices underestimated and under-secured

Fri, 16th Oct 2015
#
iot
#
risk & compliance
#
cybersecurity
Alarm over IoT security gap: IT experts claim devices in homes and business are under-protected, despite consumer confidence.
Online shopping

Quality over security for Kiwi online shoppers

Fri, 9th Oct 2015
#
martech
#
commerce systems
#
supply chain
Quality is top concern for Asia Pacific consumers shopping online, says Visa survey. Payment security is less of a concern.
Pou

ESET warns of fake apps bypassing Google Play security

Fri, 9th Oct 2015
#
malware
#
cybersecurity
#
google
Android users have been getting more than they bargained for when downloading some apps, with Google Play security failing to pick up some malware.
Tony

Is Tony Hawk's Pro Skater 5 a return to form or a big bail?

Wed, 7th Oct 2015
#
gaming
#
digital entertainment
#
activision blizzard
Tony Hawk's Pro Skater 5 comes back after a multi-year hiatus. Does the 16 year old franchise still have what it takes to excite gamers?.
Security detection

To thwart attackers, measure what matters

Wed, 30th Sep 2015
#
cybersecurity
#
cisco
#
currencies
Measuring the percentage of blocked attacks remains important, but there's another even more important measurement.
Hacker darkness threat etc

Uncover the hidden threats in encrypted traffic

Mon, 21st Sep 2015
#
encryption
#
martech
#
dlp
More and more cyber-criminals are tunnelling attacks in SSL encryption to evade detection by firewalls and other security products.
Forza 1980x1080

Forza 6 is the ultimate racing experience

Fri, 11th Sep 2015
#
gaming
#
digital entertainment
#
xbox
Turn 10 has delivered what is arguably the best game of the entire series with the release of Forza Motorsport 6.