Article posted: Mar 22

Q&A with Tomas Gustavsson, PrimeKey CTO

Here at Versasec, we're building strong partnerships with the security industry's leading companies, including PrimeKey. Recently, we sat down with Tomas Gustavsson, CTO at PrimeKey, and asked him a series of questions. Here's Mr. Gustavsson's perspective on two-factor authentication, PKI, IAM and more.

Continue Reading...

Article posted: Mar 17

By Joakim Thoren, CEO

News this week that Russian intelligence officers working with hackers were the masterminds behind the theft of 500 million Yahoo accounts is yet another cautionary tale for those who are not using two-factor authentication to protect their data.

While the salacious nature of foreign governments infiltrating the data of U.S. citizens is making headlines, home-grown hackers can inflict plenty of damage as well. Foreign or domestic, the hackers are out there. They want data and money and whatever else they can take.

Continue Reading...

Article posted: Mar 10

By Marcus Hartwig, GM Americas

Google's Nest thermostat and other consumer IoT devices are flooding the market. By 2020, Cisco predicts 50 billion IoT devices will be connected. Not surprisingly, security is a major concern for these connected devices. After all, no one likes the idea of hackers infiltrating smart devices, like DVRs or cameras, the very devices that were hacked to bring down DynDNS last October.

Continue Reading...

Article posted: Jan 31

By Joakim Thoren, CEO

There's nothing like a regime change to expose where government could beef up its cybersecurity efforts. Nowhere is that truer than in the US today, where the Donald Trump presidency is vowing for much stronger protections for the government's data.

That's welcome news to anyone but enemies of the US, and it's a trend more and more enterprises of all sizes are embracing as well. And if they take advice from security experts, they will implement multiple-factor user authentication. It's among the easiest and most effective means for protecting an organization's most valuable assets, and with help from companies like Versasec, managing the setup, cards, credentials and more is simple, cost effective, and keeps their data protected.

Continue Reading...

Article posted: Jan 23

By Joakim Thoren, CEO

More than nine out of 10 organizations are using two-factor authentication to protect at least one application, according to a recent Gemalto survey on Authentication and Identity Management. Gemalto polled 1,150 IT decision makers from around the globe in late 2016 to gain insights into organizations' identity and access management practices.

The poll results are welcome fodder for security companies who have been saying all along that multiple-factor user authentication is among the easiest and most effective means for protecting an organization's most valuable assets.

Continue Reading...

Article posted: Jan 12

By Joakim Thoren, CEO

Users of Versasec solutions take note: we've released vSEC:CMS S-Series version 4.7. This latest iteration of our flagship product includes some of the key features you've asked for, including a new server-based search algorithm that improves smart card repository search speed when using SQL databases, and new role-generation templates.

Continue Reading...

Article posted: Dec 06

By The Versasec Team

Do you need helping explaining what a smart card management system is to customers, employees, partners or the board of directors? Check out Versasec's latest video, "Smart Card Introduction", explaining why smart cards are a secure solution for identity and access management, and how they work to protect your organization's data assets.

Continue Reading...

Article posted: Nov 15

Q&A with Jerrod Chong, Yubico Vice President of Solutions

Here at Versasec, we're building strong partnerships with the security industry's leading companies, including Yubico. Recently, we sat down with Jerrod Chong, Yubico's Vice President of Solutions, and asked him a series of questions. Here's Mr. Chong's perspective on two-factor authentication, YubiKeys versus traditional smart cards, IAM and more.

Continue Reading...

Article posted: Oct 12

By Marcus Hartwig, GM Americas

When the National Institute of Standards and Technology (NIST) declared over the summer that SMS-based, two-factor identification should be put into the scrap heap of history, lots of us in the industry breathed a sigh of relief.

Continue Reading...

Article posted: Aug 17

By Joakim Thorén, CEO

If you’ve been enjoying the Olympics, you may have heard about the tight security in place in Rio for the games. And while physical security is everyone’s primary concern, it’s also important to remember that online security deserves consideration, too, as hackers in crowded areas have greater opportunities to launch attacks.

Continue Reading...