Recent Articles
How Not Deploying Zero Trust Data with AI May Risk Team Safety, Mission Failure
As AI transforms threat detection and response, securing the data that powers it is critical. The Skinny Prologue: A critical component of next-generation security is the adoption of Zero Trust Architecture (ZTA) for physical security equipment (PSE) and Operational Technology (OT)...
How FIDO Can Safeguard Against Advanced Cyber Threats
Now is the time for organizations to evaluate their authentication strategies proactively. The Skinny Recent high-profile security incidents have spotlighted how traditional password-based systems remain vulnerable to attacks. For instance, last year, hackers compromised user accounts at a well-known genetic...
Inside HID’s 2025 security report: Trends shaping access and identity
We explore key trends from HID Global’s 2025 State of Security and Identity report, with additional insights from Memoori Senior IoT Research Associate Owen Kell, on the future of access control, biometrics, AI and interoperability in security. The Skinny: HID...