CFOtech UK - Technology news for CFOs & financial decision-makers

HID stories - Page 45

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Thinkstockphotos 507331853 ixxkzpf

The unbalanced fight against network security threats

Wed, 31st Aug 2016
#
malware
#
cybersecurity
#
ixia
Network security is an unfair fight, according to Ixia, as hackers exploit vulnerabilities. Swift action can help prevent breaches.
Twitter android 623x432

ESET discovers new Android botnet controlled by Twitter

Mon, 29th Aug 2016
#
malware
#
cybersecurity
#
x
ESET uncovers a novel Android botnet, Android/Twitoor, controlled via Twitter instead of a traditional server, marking a first in mobile malware tactics.
Thinkstockphotos 467239703

Major spike in Malware encryption, Blue Coat finds

Mon, 8th Aug 2016
#
malware
#
encryption
#
cybersecurity
Web security firm Blue Coat has warned that malware hidden in SSL traffic is increasing at a significant rate.
Thinkstockphotos 149046319

Firefighting, security and compliance - are they separate issues?

Thu, 4th Aug 2016
#
cybersecurity
#
cloud services
#
opinion
Sometimes a critical issue like a virus outbreak or a major systems malfunction, sometimes something as urgent as a VSIP.
Detective magnifying glass

Can you detect advanced threats with just Flows/IPFIX?

Mon, 1st Aug 2016
#
firewalls
#
network infrastructure
#
network security
Do we have enough data to detect an advanced threat? Let's have a discussion on the usefulness of netflow-type data.
Thinkstockphotos 482398651

FireEye's latest security feature detects and protects from ransomware

Tue, 19th Jul 2016
#
malware
#
ransomware
#
breach prevention
FireEye have recently detected a cerber ransomware campaign with Exploit Guard, a new feature of FireEye Endpoint Security (HX).
Trojan virus

Have you met Delilah? The first Insider Threat Trojan

Fri, 15th Jul 2016
#
ueba
#
cybersecurity
#
trojan
New Trojan, Delilah, recruits insiders through social engineering and extortion, using ransomware techniques. Insider threats set to increase.
Phone stealing

Ransomware: First files … now complete devices

Mon, 11th Jul 2016
#
malware
#
ransomware
#
cybersecurity
Recently, a particular type of malware, has become increasingly troublesome for both businesses and home users. It is is known as ransomware.
Thinkstockphotos 485321384

New backdoor malware targeting Mac devices

Fri, 8th Jul 2016
#
malware
#
cybersecurity
#
apple
Apple users beware: New 'Backdoor.MAC.Eleanor' malware offers hackers full system control, posing as a benign file converter.
Hillary clinton 3

Are Russian hackers targeting Hillary Clinton?

Thu, 7th Jul 2016
#
phishing
#
email security
#
supply chain
Russian hackers have been targeting key staff members working for Hillary Clinton's presidential campaign, according to SecureWorks.
Thinkstockphotos 530183486

Malicious scripts in compromised websites - and how to protect yourself

Tue, 5th Jul 2016
#
malware
#
cybersecurity
#
opinion
People often highlight those threats that are more or less predictable, but the most dangerous are scripts that are hard for users to detect.
Thinkstockphotos 515805756

Do you know if your child is being cyberbullied? These are the red flags

Tue, 21st Jun 2016
#
malware
#
cybersecurity
#
cyberbullying
ESET has put together a list of indicators that help parents recognise whether their offspring are being cyberbullied.
Trojan attack

New Sofacy attacks against US government agency

Wed, 15th Jun 2016
#
firewalls
#
network infrastructure
#
network security
Recently, Unit 42 identified a spear phishing e-mail from the Sofacy group that targeted the United States government - here is a rundown.
Thinkstockphotos 482233271

Microsoft targets mother of all professional people master data with LinkedIn buy

Wed, 15th Jun 2016
#
microsoft
#
linkedin
#
opinion
So you saw the announcement: Microsoft to acquire LinkedIn for over $26bn. Our team were contemplating the meaning of the deal.
Thinkstockphotos 491119888

Looking at Health IT: When integration isn't enough

Wed, 15th Jun 2016
#
healthtech
#
opinion
#
nato
EHR adoption in US hospitals is high, but lack of interoperability and excess costs hamper progress. #HealthIT #EHR.
Thinkstockphotos 527681858

McAfee report: Mobile collusion app attacks on the rise, W32/Pinkslipbot Trojan back

Wed, 15th Jun 2016
#
malware
#
ransomware
#
casb
McAfee Labs Threats Report: June 2016 shows that mobile app collusion and the W32/Pinkslipbot Trojan are the biggest cyber threats lurking.
Cyber

A modern solution for a modern problem: IBM tackles cyber security

Tue, 31st May 2016
#
edutech
#
data analytics
#
martech
IBM unveils Watson for Cyber Security, leveraging cognitive tech and collaboration with top US universities to tackle modern cyber threats.
Budget

Ask the experts: Unwrapping the Forrest Gump budget

Wed, 4th May 2016
#
australian government
#
opinion
#
bt
Federal Treasurer Scott Morrison has unveiled a surprise Budget with measures designed to drive economic growth and combat tax avoidance.
Leak

Cyber threats coming from the inside

Thu, 21st Apr 2016
#
cybersecurity
#
solarwinds
#
solar power
IT security awareness among business leaders, especially in government, is increasing due to company data leaks, says SolarWinds.
Successful arrows

Meet a CIO with fabulous talent management skills and you'll meet a successful business

Fri, 15th Apr 2016
#
productivity
#
opinion
#
analyst report
Without inspiring lead supported from above, even the best business, the best enterprise, will disappear entirely and without much of a trace.