News2020-12-08T01:39:26-05:00

News

Advantages of moving security data to the cloud instead of on-prem

by Monica Gonzalez of Security 101 The shift from on-premise to cloud-based solutions has transformed how organizations manage and store security data. For businesses of all sizes, from retailers to manufacturing plants, the cloud offers a compelling alternative to traditional [...]

Identity Verification Trends in 2025 … and Beyond

By Entrust's Jyotsna Pantula & Andy Cease Identity verification, or IDV, is increasingly important to securing our interactions and transactions, both online and offline. Specific to the digital universe, IDV helps ensure that the individual presenting an identity credential is [...]

Elevating Self-Service Kiosk Technology

Elevating Self-Service Kiosk Technology: ImageHOLDERS and HID Collaboration February 25, 2025 by HID Global, Arthur Tay Self-service kiosks equipped with advanced technologies like facial recognition cameras, passport scanners and multi-media ticket readers, have become essential across industries. Research Nester forecasts a [...]

Biometric IDV at Onboarding and Beyond: Reduce Fraud and Enable Seamless CX

by Entrust's Brian Thron Secure and seamless identity verification (IDV) is essential to protect businesses and consumers from fraud, identity theft, and account takeovers. Traditional methods like passwords and security questions are increasingly vulnerable to cybercriminals. Enter biometrics: a transformative solution [...]

Optimizing GSOC: HiveWatch’s AI-driven approach to security

by Robert Chamberlin, Security 101 Global Security Operations Centers (GSOCs) are essential for protecting organizations in an increasingly complex threat landscape. Yet, they face persistent challenges, such as high operator turnover, missed incidents, and rising costs. To overcome these hurdles, [...]

Don’t Be the Weakest Link in Facial Recognition

Don’t Be the Weakest Link in Facial Recognition: The Crucial Role of Image Quality By HID Global, Allen Ganz Facial recognition has become ubiquitous — powering our everyday life from smartphone authentication to airport security checks. Yet, despite its technological [...]

Go to Top