TelcoNews New Zealand - Telecommunications news for ICT decision-makers

HID stories - Page 31

HID is a key player in the physical access control and trusted identity solutions space, focusing on innovations that enhance security, efficiency, and user experience across various sectors. Their work encompasses mobile access technologies, biometric authentication, cloud-based credential issuance, and integration of AI to advance security protocols.

Through their reports and product launches, HID highlights critical trends such as mobile IDs, AI-driven access management, sustainability in security systems, and the shift towards digital and AI-powered credentialing. By exploring HID-related stories, readers can gain insights into the evolving landscape of access control technologies, risk management in cyber and physical security, and the growing emphasis on seamless, secure user authentication methods.

Whether you’re interested in the impact of emerging technologies like AI and biometrics on identity verification or the strategic adoption of cloud solutions to streamline security operations, the content tagged with HID offers valuable knowledge for IT professionals, security managers, and technology enthusiasts looking to stay informed about advancements and challenges in trusted identity and access control.

Peter philipp  neo4j anz general manager

Knowledge graphs and digital twins to optimise supply chains

Fri, 3rd Jun 2022
#
uc
#
martech
#
supply chain
CIOs are turning to digital twin technology and knowledge graphs to optimize supply chains and gain insights into complex dependencies.
Gettyimages 1300107904

How AI and ML can help significantly enhance enterprise planning

Thu, 2nd Jun 2022
#
uc
#
devops
#
data analytics
Jedox's AIssisted planning solution proves to be a notable example of how AI and ML can revolutionize enterprise planning and management.
Gettyimages 1170045922

Could New Zealanders initiate a cyber attack from within?

Fri, 27th May 2022
#
advanced persistent threat protection
#
risk & compliance
#
cybersecurity
The threat landscape is significantly increasing worldwide, and the opportunities it presents are a growing concern in Aotearoa.
Gettyimages 1329825154

Third-party automotive apps bear significant privacy risks

Fri, 27th May 2022
#
data privacy
#
kaspersky
#
transport
Mobile applications for connected cars provide various features to make life easier for motorists, but they can also be a source of risk.
Future of work

The post-pandemic workforce requires secure IAM capabilities

Thu, 26th May 2022
#
malware
#
iam
#
risk & compliance
HID Global discusses what identity and access management means for organisations in today's convoluted digital world.
Gettyimages 1324620813

Asia Pacific plagued by sophisticated bad bots - report

Wed, 25th May 2022
#
breach prevention
#
cybersecurity
#
imperva
The three most common bot attacks were account takeover, content or price scraping, and scalping to obtain limited-availability items.
Chris fisher director of security engineering apj  vectra

Understanding the weight on security leader's shoulders, and how to shift it

Fri, 20th May 2022
#
devops
#
supply chain
#
apm
Millions of dollars are being invested in cybersecurity in Australia and New Zealand to combat increasing threats.
Msi z690%2bcarbon wifi 00

Hands-on Review: MSI MPG Z690 Carbon WIFI motherboard

Mon, 16th May 2022
#
gaming
#
semiconductors
#
digital entertainment
It's all change with Intel's 12th generation CPUs. We have a new chipset in the 600-series, a new socket with the LGA 1700, and new DDR5 memory.
Gettyimages 901110192

Video: 10 Minute IT Jams - An update from IronNet

Fri, 13th May 2022
#
ransomware
#
advanced persistent threat protection
#
ndr
Michael Ehrlich joins us today to discuss the history of IronNet and the crucial role the company plays in the cyber defence space.
Gettyimages 1369901424

Mitiga discovers potential hidden dangers in Google Cloud Platform's (GCP) cloud control plane

Fri, 6th May 2022
#
edutech
#
hyperscale
#
public cloud
Potential risks have been found in the Cloud Control Plane, with the company warning of vulnerabilities in Google Cloud Platform.
Gettyimages 1306421028

New strategies for cloud-native attacks - Aqua Security

Mon, 2nd May 2022
#
virtualisation
#
edutech
#
devops
New research from Aqua Security reveals attackers are using more sophisticated techniques to target cloud-native environments.
Gettyimages 1325179799

Trend Micro launches security platform with host of partners

Wed, 27th Apr 2022
#
partner programmes
#
risk & compliance
#
cybersecurity
Trend Micro has announced the launch of Trend Micro One, a unified cybersecurity platform with a growing list of ecosystem technology partners.
Compatible pic   george tsuokas  3

Why it's essential to focus on security fundamentals

Wed, 27th Apr 2022
#
dr
#
encryption
#
mfa
The White House has issued comprehensive cybersecurity recommendations to protect against potential Russian cyber-attacks.
Gettyimages 853878130

The dark web in Aotearoa: Is it as bad as we think?

Wed, 27th Apr 2022
#
cybersecurity
#
gcsb
#
dark web
Encountering the term 'dark web' might bring thoughts of criminal activity and harmful behaviour to mind, but what exactly is it, and is it all bad?.
Gettyimages 1325899588

Workday helps Swyftx make the right people decisions

Wed, 27th Apr 2022
#
data analytics
#
crypto
#
blockchain
Australian-owned and operated cryptocurrency exchange, Swyftx, uses Workday's Voice of the Employee platform to properly listen to employees.
Gettyimages 1162572806

Are Kiwis winning or losing when it comes to gaming security?

Wed, 27th Apr 2022
#
gaming
#
phishing
#
email security
The rise of online gaming in New Zealand comes with significant risks, as cyber attacks target players, especially the younger ones.
Jason leonidas 1200x677

Human element key to world-class digital customer experience

Tue, 26th Apr 2022
#
crm
#
cx
#
martech
The shift to digital is unstoppable, but the pressure on IT professionals is causing burnout. How can businesses reduce stress and retain talent?.
Gettyimages 1345778718

Evolving techniques targeting cloud native environments uncovered

Fri, 22nd Apr 2022
#
devops
#
application security
#
supply chain
Attackers are finding new ways to target cloud native environments, new research from Aqua Security has revealed.
Gettyimages 1333810802

Four ways to monetise your data, according to a data expert

Thu, 21st Apr 2022
#
data analytics
#
martech
#
planning
In this article, Rohan Persaud, Director of Channels and Alliances and leading expert from Sisense, reveals how organisations can transform data into revenue.
Weird west 1

Game review: Weird West (PlayStation 4)

Wed, 13th Apr 2022
#
gaming
#
digital entertainment
#
graphics
There have been many games released over the years based on the wild west era, but Weird West is one of the most unique.