Hands typing on laptop

HID Global’s Top 10 Blog Posts of 2021

The year is almost over. As we look to the holiday season and the coming new year, we are all hoping for something closer to the normal we once knew, even if it’s on different terms. There will be new trends to discuss and predictions for the security market, but before we dive into what’s next, let’s talk about the 2021 security topics that interested you most.

We put together a lot of blogs — from checklists to how-to articles and future forecasts — to ensure the right information is at your fingertips. It’s our goal to provide resources you can tap into for the latest trends, educational opportunities and industry best practices. This recap of the most popular blog posts of 2021 provides a refresh of the essential information your peers were reading. Make sure you didn’t miss an important post!

Without further ado, here are HID Global’s top 10 blog posts for 2021. We see a few themes emerging from your chosen reading material. How about you?

  1. What Is Timestamping and How to Use It With Digital Signatures – There have been a lot of changes since the pandemic began in 2020, including the ways we travel, shop and most importantly, work. Amid shutdowns and lockdowns, organizations sent employees home and hybrid work models emerged for the bast majority of employees. This blog looks at the accelerated the need for a “digital signature” in documents and software code, as well as the proper implementation requirements to reduce risks.
  2. How to Establish a Secure Visitor Management System – Business hacks and data breaches continue to be a big concern, and organizations focused on cyber security to fortify against virtual attacks. This blog details how robust physical security rose as an essential part of security strategies, especially regarding visitor management as return-to-work efforts move forward. From monitoring contractors and partners to tracking the location of visitors in facilities, an integrated visitor management system creates the low-friction, high-security environment necessary for in-person work.
  3. Going Passwordless with HID, Microsoft and FIDO2 – Technology is ever-changing, leading to increased security demands. Organizations continue to evolve and face the challenges head-on, including balancing protection with a convenient and seamless user experience. Authentication technology, specifically passwordless authentication through FIDO2 technology, can assist organizations in doing just that while protecting access to physical systems and cloud-based applications.
  4. Powering Trusted Identities and Trusted Reviews: HID DigitalPersona® is Now TRUE Certified –  DigitalPersona, a key solution within HID’s multi-factor authentication portfolio, was recognized by TrustRadius as a certified TRUE program vendor. We achieved this certification through inviting and providing all customers with the equal opportunity to share honest feedback about our solution, as well as ensuring that we disclose how we source these reviews. Learn more about the certification and why it’s important in the blog.
  5. Visitor Badge Management — Your Questions Answered – Visitor management was a relevant topic for 2021 and protecting physical access to buildings and facilities is vital to strong security. Managing visitor badges helps reduce the risk of unauthorized entry and protects your employees and systems. Find the answers to your questions about visitor badges and the best practices for issuing, tracking and revoking visitor badges in this blog.
  6. Highlights From the 2021 State of Physical Access Control ReportThe State of Physical Access Control Report is an annual summary of the findings gleaned from the Access Control Systems Trend Survey. Security professionals across industries and organizations provide insights into the shifting security landscape and we gather the findings into a comprehensive guide of best practices and based on the trends, challenges and opportunities coming out of the latest survey. This blog provides the highlights from the 2021 report. Read on to learn about the impacts and changes the industry faces.
  7. All You Need to Know About Automated Certificate Management Environment (ACME) – The Automated Certificate Management Environment (ACME) protocol is a communication protocol for automating certificate issuance and renewal between certificate authorities and web servers. It was designed by the Internet Security Research Group (ISRG) for their Let’s Encrypt service, which is a non-profit certificate authority with the goal of securing all websites using HTTPS. This blog provides you with an explanation of how the ACME protocol works and how PKI-as-a-Service can help you automate certification management.
  8. True Crime Stories – DNA Evidence and Identical Twins – Prosecuting and convicting criminal perpetrators may seem straightforward, but mistakes can lead to innocent people spending time in prison. Getting evidence right is important. In this installment of True Crime Stories, DNA evidence could have led to the wrongful conviction of a twin brother. Fingerprint analysis was a key tool in solving the case.
  9. HID Global Enhances Student Experiences at Vanderbilt University; Enables IDs on iPhone & Apple Watch – College campuses are embracing the benefits of touchless access using smartphones. This blog details how Vanderbilt University expanded its investment into campus safety and security by leveraging HID Mobile Access® to deploy campus IDs on iPhone and Apple Watch through Apple Wallet — as well as the details of the implementation and the benefits of the program. 
  10. The Ultra-Wide Possibilities of Ultra-Wide Band – Ultra-Wide Band (UWB) offers new promise in the world of secure access to a multitude of systems. Smarter World is a part of The NXP® Podcast, Insights Into Trailblazing Technologies. In this episode, EE Times Editor Nitin Dahad is joined by Charles Dachs, VP & General Manager, Secure Embedded Transactions at NXP Semiconductors, and Ramesh Songukrishnasamy, SVP & CTO at HID Global, to explore UWB’s evolution from a data transfer technology to its new role as a fine ranging technology. Visit the blog for a link to the podcast.