ChannelLife UK - Industry insider news for technology resellers

HID stories - Page 38

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Screen shot 2018 09 02 at 3

Survey: Rising role of IT in physical security provides opportunities

Mon, 10th Sep 2018
#
physical security
#
cybersecurity
#
whitepaper
In addition to taking care of cybersecurity, IT departments are having to adapt to spearhead issues set forth by the physical security dept.
Thinkstockphotos 904420160

Secureworks opens up proprietary UEBA through partner programme

Wed, 5th Sep 2018
#
partner programmes
#
ueba
#
secureworks
With the launch of its Red Cloak Partner Program, Secureworks will engage in a more transparent exchange of raw data with participating vendors.
Healthcare2

Cryptomining and IoT attacks gunning for healthcare industry

Wed, 22nd Aug 2018
#
malware
#
iot security
#
ai security
Medical staff now carry multiple connected devices with them, including personal devices that lack appropriate security controls.
Partnership copy

Gigamon partners with Endace for improved network visibility

Mon, 20th Aug 2018
#
firewalls
#
network infrastructure
#
devops
Analysts often struggle to uncover the evidence they need to quickly determine the root cause of cyber threats.
Cloud intergration

The best VPNs: How to safely transfer files

Mon, 13th Aug 2018
#
vpns
#
torrenting
#
thebestvpn
Choosing the right VPN for torrenting involves navigating various factors such as jurisdiction, speed, and logging policies to safeguard your file transfers.
Jane frankland 3

Exclusive: Tackling the challenges faced by women in cybersecurity

Fri, 3rd Aug 2018
#
dei
#
stem
#
gender diversity
Some companies though do an incredible job of recruiting women into their workforces, but they have problems retaining them.
Thinkstockphotos 470542178

Benelux security distributor DCB to operate as part of Nuvias Group

Thu, 2nd Aug 2018
#
ddos
#
cybersecurity
#
distributors
DCB has been established in the Benelux for more than 20 years, but the company says the move under Nuvias Group will open up more opportunities.
Threat detection

Make the pre-emptive strike against cyberattacks with threat hunting

Mon, 23rd Jul 2018
#
firewalls
#
network infrastructure
#
network security
Threat hunting starts with the assumption that bad actors have already breached perimeter defences and are operating inside the environment.
Fallback

Ticketmaster breach part of massive digital credit card skimming campaign

Thu, 12th Jul 2018
#
breach prevention
#
cybersecurity
#
data breach
The Ticketmaster breach is part of a global digital card-skimming campaign by Magecart, affecting over 800 eCommerce sites, reveals RiskIQ.
Guy dude

Why email still makes for a great business tool

Mon, 9th Jul 2018
#
data analytics
#
martech
#
cdp
Despite the surge of social media and new communication tools, email remains a formidable business tool due to its directness and personalisation potential.
Bitcoin2

Criminals “infect and collect” in cryptocurrency mining surge

Fri, 6th Jul 2018
#
crypto
#
blockchain
#
casb
Coin miner malware grew a stunning 629% in the first quarter of 2018, rocketing from around 400,000 total known samples in Q4 2017 to more than 2.9mil.
Ai

Commvault partners with Lucidworks to bring AI innovations to data backup market

Fri, 6th Jul 2018
#
data analytics
#
martech
#
planning
Commvault announced a new technology partnership with Lucidworks, a leader in AI-powered search and discovery.
Screen shot 2018 07 03 at 4

Exclusive: A tour of Interxion's London campus that's actually in London

Wed, 4th Jul 2018
#
datacentre infrastructure
#
hyperscale
#
dc
In this interview, Interxion's MD took us through his data centre campus inside an old brewery, on top of various bars, cafes, and a vinyl shop.
Thinkstockphotos 957639252

Fileless malware: Today's unseen threat to businesses

Mon, 25th Jun 2018
#
advanced persistent threat protection
#
interactive
#
opinion
The number of fileless malware attacks is on the rise, with a survey estimating a 35% increase in 2018. Here's how to protect yourself.
Thinkstockphotos 965714492

Bitdefender unravels the mystery of the Zacinlo adware

Wed, 20th Jun 2018
#
malware
#
cybersecurity
#
bitdefender
The Zacinlo malware, which Bitdefender classes as an advanced strain of spyware, has been operating covertly since 2012.
Thinkstockphotos 518650906

After five years, the InvisiMole spyware isn't so invisible anymore

Wed, 20th Jun 2018
#
malware
#
cybersecurity
#
spyware
InvisiMole is able to turn the affected computer into a video camera, which allows the attackers see and hear what's going on around their victim.
Thinkstockphotos 489145508

Why 'best-fit' is replacing 'best-of-breed' software solutions

Fri, 15th Jun 2018
#
data analytics
#
planning
#
software
Businesses are shifting from 'best-of-breed' to 'best-fit' software solutions, prioritising customisation and cost-efficiency over one-size-fits-all approaches.
Fallback

Security: One size fits all? Or the glove that just won't fit right?

Tue, 5th Jun 2018
#
endpoint protection
#
edr
#
cybersecurity
In an era of evolving cyber threats, SonicWall urges firms to customise cybersecurity solutions rather than rely on outdated one-size-fits-all methods.
Thinkstockphotos 938634456

Amazon vs. consumers on the Aussie shutout

Fri, 1st Jun 2018
#
martech
#
commerce systems
#
amazon
Amazon announced that due to GST regulation they will no longer be shipping from the US to Australia. Its comment and the consumer perspective inside.
Screen shot 2018 05 31 at 2

Advice: FBI urges people to reboot their routers following Russia attack

Fri, 1st Jun 2018
#
advanced persistent threat protection
#
ai security
#
ai
After the FBI issued a plea for people around the world to reset their routers, Vectra's EMEA director has some advice for businesses moving forward.