Article posted: Mar 22
Q&A with Tomas Gustavsson, PrimeKey CTO
Here at Versasec, we're building strong partnerships with the security industry's leading companies, including PrimeKey. Recently, we sat down with Tomas Gustavsson, CTO at PrimeKey, and asked him a series of questions. Here's Mr. Gustavsson's perspective on two-factor authentication, PKI, IAM and more.
Article posted: Dec 13
By Joakim Thoren, CEO
Our late fall 2016 global survey of IT and cybersecurity professionals has turned up some interesting trends for 2017, not the least of which is that more and more companies are and will be using multi-factor authentication to secure their data.
Article posted: Nov 15
Q&A with Jerrod Chong, Yubico Vice President of Solutions
Here at Versasec, we're building strong partnerships with the security industry's leading companies, including Yubico. Recently, we sat down with Jerrod Chong, Yubico's Vice President of Solutions, and asked him a series of questions. Here's Mr. Chong's perspective on two-factor authentication, YubiKeys versus traditional smart cards, IAM and more.
Article posted: Nov 10
By Joakim Thorén, CEO
We've got some good news to share. Versasec has been nominated for two Cybersecurity Excellence Awards. These annual awards "honor individuals and companies that demonstrate excellence, innovation and leadership in information security. The awards are produced in partnership with the Information Security Community on LinkedIn, tapping into the vast experience of over 300,000+ cybersecurity professionals to recognize the world's best cybersecurity products, professionals and organizations."
Article posted: Oct 12
By Marcus Hartwig, GM Americas
When the National Institute of Standards and Technology (NIST) declared over the summer that SMS-based, two-factor identification should be put into the scrap heap of history, lots of us in the industry breathed a sigh of relief.
Article posted: Oct 06
By Joakim Thorén, CEO
A recent NetworkWorld blog raised some relevant points about identity management for enterprises.
In the article, author and ESG Cybersecurity Analyst Jon Oltsik stresses that "strong authentication is a requirement," saying that "all organizations should have a plan in place for totally eliminating user names and passwords."
Article posted: Mar 28
Whether you're an existing Versasec customer, a prospective customer or someone who is interested in learning more about the identity and access management (IAM) space, we've got a video we'd like you to watch. It's educational, illuminating and even refreshing. Here's why:
Article posted: Oct 08
By Paul Foley, Professional Services Director and Co-Founder
In part one of this blog, I highlighted the pitfalls of single-factor authentication, using the example of a company being attacked by a disgruntled employee. In that scenario, unhappy Mallory uses the Windows Recovery Tool to find the network credentials of co-workers with whom she shares a workstation. Her intentions are not good.