Article posted: Mar 17

By Joakim Thoren, CEO

News this week that Russian intelligence officers working with hackers were the masterminds behind the theft of 500 million Yahoo accounts is yet another cautionary tale for those who are not using two-factor authentication to protect their data.

While the salacious nature of foreign governments infiltrating the data of U.S. citizens is making headlines, home-grown hackers can inflict plenty of damage as well. Foreign or domestic, the hackers are out there. They want data and money and whatever else they can take.

Continue Reading...

Article posted: Mar 10

By Marcus Hartwig, GM Americas

Google's Nest thermostat and other consumer IoT devices are flooding the market. By 2020, Cisco predicts 50 billion IoT devices will be connected. Not surprisingly, security is a major concern for these connected devices. After all, no one likes the idea of hackers infiltrating smart devices, like DVRs or cameras, the very devices that were hacked to bring down DynDNS last October.

Continue Reading...

Article posted: Mar 01

By Marcus Hartwig, GM Americas

For more than 20 years, cryptographic hash functions like SHA-1 have played a major role in browser security, managing code repositories or even just detecting duplicate files in storage. SHA-1, or Secure Hash Algorithm 1, was designed by the United States National Security Agency and was published by the United States NIST. We applaud the recent collaboration of the CWI Institute in Amsterdam and Google, which now shows its many flaws and security weaknesses.

Continue Reading...

Article posted: Jan 31

By Joakim Thoren, CEO

There's nothing like a regime change to expose where government could beef up its cybersecurity efforts. Nowhere is that truer than in the US today, where the Donald Trump presidency is vowing for much stronger protections for the government's data.

That's welcome news to anyone but enemies of the US, and it's a trend more and more enterprises of all sizes are embracing as well. And if they take advice from security experts, they will implement multiple-factor user authentication. It's among the easiest and most effective means for protecting an organization's most valuable assets, and with help from companies like Versasec, managing the setup, cards, credentials and more is simple, cost effective, and keeps their data protected.

Continue Reading...

Article posted: Jan 23

By Joakim Thoren, CEO

More than nine out of 10 organizations are using two-factor authentication to protect at least one application, according to a recent Gemalto survey on Authentication and Identity Management. Gemalto polled 1,150 IT decision makers from around the globe in late 2016 to gain insights into organizations' identity and access management practices.

The poll results are welcome fodder for security companies who have been saying all along that multiple-factor user authentication is among the easiest and most effective means for protecting an organization's most valuable assets.

Continue Reading...

Article posted: Jan 12

By Joakim Thoren, CEO

Users of Versasec solutions take note: we've released vSEC:CMS S-Series version 4.7. This latest iteration of our flagship product includes some of the key features you've asked for, including a new server-based search algorithm that improves smart card repository search speed when using SQL databases, and new role-generation templates.

Continue Reading...

Article posted: Dec 06

By The Versasec Team

Do you need helping explaining what a smart card management system is to customers, employees, partners or the board of directors? Check out Versasec's latest video, "Smart Card Introduction", explaining why smart cards are a secure solution for identity and access management, and how they work to protect your organization's data assets.

Continue Reading...

Article posted: Oct 06

By Joakim Thorén, CEO

A recent NetworkWorld blog raised some relevant points about identity management for enterprises.

In the article, author and ESG Cybersecurity Analyst Jon Oltsik stresses that "strong authentication is a requirement," saying that "all organizations should have a plan in place for totally eliminating user names and passwords."

Continue Reading...

Article posted: May 02

By Joakim Thorén, CEO

When you have a great working relationship with one of the best CA and PKI management systems in the world, you make your customers very happy. Now, we've formalized our working relationship with PrimeKey Solutions AB to benefit the security needs of our joint customers.

Continue Reading...

Article posted: Oct 08

By Paul Foley, Professional Services Director and Co-Founder

In part one of this blog, I highlighted the pitfalls of single-factor authentication, using the example of a company being attacked by a disgruntled employee. In that scenario, unhappy Mallory uses the Windows Recovery Tool to find the network credentials of co-workers with whom she shares a workstation. Her intentions are not good.

Continue Reading...