Article posted: Jun 07, 2017

By Joakim Thoren, CEO

It's no surprise that as the numbers of places where voters can make their election choices electronically increase so, too, do concerns around security, reliability, privacy and safety. But when you're in our business, you know that the technology certainly exists to ensure electronic voting addresses every one of those concerns.

Continue Reading...

Article posted: May 25, 2017

By Joakim Thoren, CEO

It's not often that Mashable writes about two-factor authentication (2FA), but it's a sign that personal security is being threatened and organizations and individuals are concerned. The latest malware virus, WannaCry, shocked the security industry and exploited older operating and legacy systems, shutting down hospitals in the UK and large multinational organizations around the world.

Continue Reading...

Article posted: Apr 12, 2017

By Joakim Thoren, CEO

Cities in tornado zones have emergency sirens for a reason: to alert their populations of impending potential major storms, hail or other emergency situations either in the city or in surrounding environs. So, imagine the sheer panic raised when all 156 of Dallas' tornado sirens were sounding for approximately 90 minutes during the wee hours of the night over this past weekend.

Continue Reading...

Article posted: Apr 11, 2017

By Joakim Thoren, CEO

Analyst research firm International Data Corporation (IDC) says companies are prepared to spend more money on their security this year. Its recently updated Worldwide Semiannual Security Spending Guide, forecasts worldwide revenue for security-related hardware, software and services will reach $81.7 billion in 2017, an increase of 8.2 percent over 2016. IDC's Spending Guides provide a granular view of key technology markets from a regional, vertical industry use case, buyer, and technology perspective.

Continue Reading...

Article posted: Mar 22, 2017

Q&A with Tomas Gustavsson, PrimeKey CTO

Here at Versasec, we're building strong partnerships with the security industry's leading companies, including PrimeKey. Recently, we sat down with Tomas Gustavsson, CTO at PrimeKey, and asked him a series of questions. Here's Mr. Gustavsson's perspective on two-factor authentication, PKI, IAM and more.

Continue Reading...

Article posted: Dec 13, 2016

By Joakim Thoren, CEO

Our late fall 2016 global survey of IT and cybersecurity professionals has turned up some interesting trends for 2017, not the least of which is that more and more companies are and will be using multi-factor authentication to secure their data.

Continue Reading...

Article posted: Nov 15, 2016

Q&A with Jerrod Chong, Yubico Vice President of Solutions

Here at Versasec, we're building strong partnerships with the security industry's leading companies, including Yubico. Recently, we sat down with Jerrod Chong, Yubico's Vice President of Solutions, and asked him a series of questions. Here's Mr. Chong's perspective on two-factor authentication, YubiKeys versus traditional smart cards, IAM and more.

Continue Reading...

Article posted: Nov 10, 2016

By Joakim Thorén, CEO

We've got some good news to share. Versasec has been nominated for two Cybersecurity Excellence Awards. These annual awards "honor individuals and companies that demonstrate excellence, innovation and leadership in information security. The awards are produced in partnership with the Information Security Community on LinkedIn, tapping into the vast experience of over 300,000+ cybersecurity professionals to recognize the world's best cybersecurity products, professionals and organizations."

Continue Reading...

Article posted: Oct 12, 2016

By Marcus Hartwig, GM Americas

When the National Institute of Standards and Technology (NIST) declared over the summer that SMS-based, two-factor identification should be put into the scrap heap of history, lots of us in the industry breathed a sigh of relief.

Continue Reading...

Article posted: Oct 06, 2016

By Joakim Thorén, CEO

A recent NetworkWorld blog raised some relevant points about identity management for enterprises.

In the article, author and ESG Cybersecurity Analyst Jon Oltsik stresses that "strong authentication is a requirement," saying that "all organizations should have a plan in place for totally eliminating user names and passwords."

Continue Reading...