Article posted: May 25

By Joakim Thoren, CEO

It's not often that Mashable writes about two-factor authentication (2FA), but it's a sign that personal security is being threatened and organizations and individuals are concerned. The latest malware virus, WannaCry, shocked the security industry and exploited older operating and legacy systems, shutting down hospitals in the UK and large multinational organizations around the world.

Continue Reading...

Article posted: May 18

By Joakim Thoren, CEO

Everyone is talking about the recent worldwide ransomware cyberattack, named WannaCry. A suitable name as the WannaCry ransomware attack was particularly vicious, shutting down hospitals and disrupting high-profile operations like Telefonica, FedEx and Renault.

According to a recent ECNMag article, this was the "largest ransomware attack observed in history." Europol Chief Rob Wainwright added, "More than 200,000 victims have been hit in 150 countries as of last week."

Continue Reading...

Article posted: May 09

By Joakim Thoren, CEO

Social engineering is a cybercriminal's best friend. That's according to Juniper Research, which recently published the "Cybercrime and The Internet of Threats 2017" whitepaper.

In its report, the Juniper team says that even with evolving methods for attempting unauthorized access of computing systems, the preferred route taken by most hackers is still this: duping users into opening the door. Simply put, cybercrime is often perpetrated through social engineering.

Continue Reading...

Article posted: May 03

By Nick Budden, Partner and Security Expert at Versasec

A recent BBC.com article pointed out Public Key Cryptography (PKI), created by researchers at Stanford University in 1977, is celebrating its 40th birthday. The findings of the Stanford team were nearly silenced by a US government agency at the time, which viewed this research as "legally equivalent to exporting nuclear arms to a hostile foreign power."

But why did the US think that sharing PKI research was so damaging to national security?

Continue Reading...

Article posted: Apr 17

By Joakim Thoren, CEO

Version 4.8 of our flagship product, vSEC:CMS is here, and this latest version incorporates more options for managing security credentials on the user side. In the latest iteration of the vSEC:CMS S-Series, the primary changes our customers will see relate to user self-service improvements.

Continue Reading...

Article posted: Apr 12

By Joakim Thoren, CEO

Cities in tornado zones have emergency sirens for a reason: to alert their populations of impending potential major storms, hail or other emergency situations either in the city or in surrounding environs. So, imagine the sheer panic raised when all 156 of Dallas' tornado sirens were sounding for approximately 90 minutes during the wee hours of the night over this past weekend.

Continue Reading...

Article posted: Apr 11

By Joakim Thoren, CEO

Analyst research firm International Data Corporation (IDC) says companies are prepared to spend more money on their security this year. Its recently updated Worldwide Semiannual Security Spending Guide, forecasts worldwide revenue for security-related hardware, software and services will reach $81.7 billion in 2017, an increase of 8.2 percent over 2016. IDC's Spending Guides provide a granular view of key technology markets from a regional, vertical industry use case, buyer, and technology perspective.

Continue Reading...

Article posted: Apr 04

By Joakim Thoren, CEO

Access to a diverse workforce spread across many geographies is one of the most appealing aspects of working at Versasec. That's what many of our employees told an external, independent consultant we recently brought in to study our company, the job satisfaction of our existing team, our processes, and to help us gauge ways to better promote our global employment opportunities.

Continue Reading...

Article posted: Mar 22

Q&A with Tomas Gustavsson, PrimeKey CTO

Here at Versasec, we're building strong partnerships with the security industry's leading companies, including PrimeKey. Recently, we sat down with Tomas Gustavsson, CTO at PrimeKey, and asked him a series of questions. Here's Mr. Gustavsson's perspective on two-factor authentication, PKI, IAM and more.

Continue Reading...

Article posted: Mar 17

By Joakim Thoren, CEO

News this week that Russian intelligence officers working with hackers were the masterminds behind the theft of 500 million Yahoo accounts is yet another cautionary tale for those who are not using two-factor authentication to protect their data.

While the salacious nature of foreign governments infiltrating the data of U.S. citizens is making headlines, home-grown hackers can inflict plenty of damage as well. Foreign or domestic, the hackers are out there. They want data and money and whatever else they can take.

Continue Reading...