Skip to main content
Product Marketing Manager of Cloud Authentication in IAM solutions
HID Global Ranked Champion by Info-Tech IAM Emotional Footprint Diamond
Customers are at the center of everything we do at HID Global, and we are delighted that our customers rated us so highly in their Info-Tech reviews.
4 Effective Methods to Protect Against Phishing Attacks
Today, the core tenets of phishing attacks remain the same. What’s changing is the presentation. Learn 4 proven ways to protect yourself and your organization.
A Security Playbook for Working from Home
Cryptography, Then and Now
Though the history of cryptography is littered with broken codes and clever workarounds, data security advances on. Read about encryption from past to present.
Corporate Espionage: Are You Prepared for the Threat from Within?
Investigate the notorious cyber-heists of the past and see how today’s identity access management solutions can protect against corporate security breaches from within.
Why You Should Consider FIDO Universal 2-Factor Authentication
The fight against stolen credentials has led to the growing adoption of two-factor authentication (2FA) or multifactor authentication (MFA) as an additional layer of security.