CFOtech New Zealand - Technology news for CFOs & financial decision-makers

HID stories - Page 72

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Trojan virus

Have you met Delilah? The first Insider Threat Trojan

Fri, 15th Jul 2016
#
ueba
#
cybersecurity
#
trojan
New Trojan, Delilah, recruits insiders through social engineering and extortion, using ransomware techniques. Insider threats set to increase.
Choices cloud

Private or public... why not both? The Hybrid Cloud Is here

Thu, 14th Jul 2016
#
storage
#
private cloud
#
public cloud
Here are just some of the strengths and benefits of both public and private cloud approaches for small businesses.
Phone stealing

Ransomware: First files … now complete devices

Mon, 11th Jul 2016
#
malware
#
ransomware
#
cybersecurity
Recently, a particular type of malware, has become increasingly troublesome for both businesses and home users. It is is known as ransomware.
Thinkstockphotos 485321384

New backdoor malware targeting Mac devices

Fri, 8th Jul 2016
#
malware
#
cybersecurity
#
apple
Apple users beware: New 'Backdoor.MAC.Eleanor' malware offers hackers full system control, posing as a benign file converter.
Hillary clinton 3

Are Russian hackers targeting Hillary Clinton?

Thu, 7th Jul 2016
#
phishing
#
email security
#
supply chain
Russian hackers have been targeting key staff members working for Hillary Clinton's presidential campaign, according to SecureWorks.
Fallback

Three of the most common myths about SSL encryption

Thu, 7th Jul 2016
#
encryption
#
martech
#
software development
Delving into the world of SSL Encryption, here are some of the myths that persist about SSL traffic as well as the SSL blind spot.
Original 2

Review: Grand Kingdom on PS4

Wed, 6th Jul 2016
#
gaming
#
digital entertainment
#
reviews
Grand Kingdom is a new tactical RPG that you can now play on the PS4. With that being said, is this game accessible to everyone?.
Thinkstockphotos 530183486

Malicious scripts in compromised websites - and how to protect yourself

Tue, 5th Jul 2016
#
malware
#
cybersecurity
#
opinion
People often highlight those threats that are more or less predictable, but the most dangerous are scripts that are hard for users to detect.
Thinkstockphotos 535280607

Kiwi ISPs in the spotlight - does your provider steal the show?

Fri, 1st Jul 2016
#
uc
#
isp
#
internetnz
It's about to get a whole lot easier for Kiwis to choose the best internet service provider based on your needs, and ISPs can no longer hide.
94e2a2e841b0336a5fa1908ea9f1c51c

Independence Day Resurgence: The critics aren't happy

Thu, 23rd Jun 2016
#
film review
#
reviews
#
technology gifts
Sequel slump: 'Independence Day Resurgence' fails to ignite critic enthusiasm, with lacklustre charm and plot.
Business boxers

Spark comes out swinging at Vodafone, claims No.1 spot

Wed, 22nd Jun 2016
#
uc
#
spark
#
managing director
The NZ telco market is fiercely contested - now Spark has come out with claims that they're the biggest revenue earners.
Thinkstockphotos 515805756

Do you know if your child is being cyberbullied? These are the red flags

Tue, 21st Jun 2016
#
malware
#
cybersecurity
#
cyberbullying
ESET has put together a list of indicators that help parents recognise whether their offspring are being cyberbullied.
Thinkstockphotos 480206837

Five technologies ready to disrupt your business

Tue, 21st Jun 2016
#
iot
#
ar, vr & metaverse
#
apps
Personal technologies are set to have a major impact on every business across the globe, according to Gartner.
Thinkstockphotos 482233271

Microsoft targets mother of all professional people master data with LinkedIn buy

Wed, 15th Jun 2016
#
microsoft
#
linkedin
#
opinion
So you saw the announcement: Microsoft to acquire LinkedIn for over $26bn. Our team were contemplating the meaning of the deal.
Thinkstockphotos 491119888

Looking at Health IT: When integration isn't enough

Wed, 15th Jun 2016
#
healthtech
#
opinion
#
nato
EHR adoption in US hospitals is high, but lack of interoperability and excess costs hamper progress. #HealthIT #EHR.
Thinkstockphotos 527681858

McAfee report: Mobile collusion app attacks on the rise, W32/Pinkslipbot Trojan back

Wed, 15th Jun 2016
#
malware
#
ransomware
#
casb
McAfee Labs Threats Report: June 2016 shows that mobile app collusion and the W32/Pinkslipbot Trojan are the biggest cyber threats lurking.
Idea blackboard

7 modern security problems you can solve with Encrypted Traffic Management

Thu, 9th Jun 2016
#
firewalls
#
network infrastructure
#
encryption
Blue Coat has identified a few challenges plaguing security and network teams and how the right Encrypted Traffic Management solutions can help.
Thinkstockphotos 463151329

Windows flaw enhances DNS hijacking

Tue, 7th Jun 2016
#
malware
#
cybersecurity
#
microsoft
ESET discovers new version of DNS Unlocker with sneaky capabilities to re-configure DNS settings on victims' computers.
Ransomware laptop

Fortinet and Ransomware: What your clients need to know

Fri, 3rd Jun 2016
#
malware
#
firewalls
#
network infrastructure
The best way to protect your digital assets from Ransomware is to not get compromised in the first place - but can it be done?.
Samsung suhd tv

Samsung launches revolutionary new family of TVs

Fri, 3rd Jun 2016
#
digital entertainment
#
samsung
#
tv
2016 SUHD TVs with Quantum dot display deliver the most true-to-life picture quality, and the world's first curved boundless TV design.