Article posted: Dec 14, 2017

By Joakim Thorén, CEO

Two-factor authentication (2FA) is one of the most powerful and well-established techniques for strengthening user credentials. The U.S. government requires all its employees, contractors and vendors use 2FA. And businesses of all types should follow suit.

Our partners at Yubico agree. They've written a blog about how we work together, and we invite you to take a look by visiting https://www.yubico.com/2017/12/2fa…

Continue Reading...

Article posted: Dec 13, 2017

By William Houry, VP of Sales

It was inevitable: the scammers are now going after companies in Europe and elsewhere that are preparing for the European Union's cybersecurity General Data Protection Regulation (GDPR), also known as EU 2016/679. The GDPR privacy rules go into full effect in May 2018.

In early December in France it was reported that companies preparing for the GDPR, which is known as the RGPD in France, were being targeted with some less-than-sophisticated phishing-type schemes. According to what was reported, the scheme involved alarm-inducing urgent phone calls and faxed messages to companies, purportedly from the Commission nationale de l'informatique et des libertés (CNIL).

Continue Reading...

Article posted: Dec 12, 2017

By Joakim Thorén, CEO

In its recent report, "Advanced Authentication Market Research Report - Global Forecast to 2023," technology research firm Market Research Future provided insight into why the advanced authentication market will grow significantly, topping $7B USD by 2023.

Among the report highlights, Market Research Future noted that new identity and access technologies are driving sales and market growth. Advanced authentication adds an additional layer of security to standard username and password authentication method. Identity and access management companies recognize that hackers are stealing identity badges and numeric PINs. In response, they have developed different authentication techniques such as one-time passwords (OTPs), biometrics and virtual smart cards.

Continue Reading...

Article posted: Dec 11, 2017

Q&A with Jeff Ciraulo, President, Envoy Data Corporation

We're pleased to offer a fourth installation of our quarterly partner blog series. We recently spoke with Jeff Ciraulo, Envoy Data Corporation's President, and he provided valuable insights on the two-factor authentication market and discussed why cloud services will need strong two-factor identification.

Continue Reading...

Article posted: Oct 30, 2017

By Marcus Hartwig, Versasec GM Americas

Blockchain is being hailed as a serious security contender, from protecting data to fortifying digital apps, and thanks to cryptocurrencies it is gaining strong momentum.

In fact, Blockchain is the technology that enables the very existence of cryptocurrency (among other things). The best known of these, Bitcoin, is the cryptocurrency for which blockchain technology was invented. Simply put, a cryptocurrency is a digital version of a monetary exchange that uses encryption techniques to control the creation of monetary units and to verify the transfer of funds.

Continue Reading...

Article posted: Oct 19, 2017

By Joakim Thorén, Versasec CEO

The entire Versasec team is pleased to announce we've been named by Dagens Industri, the most influential business publication in Sweden, as a 2017 "Gasell." The newspaper's Gasell (the Swedish word for gazelle) list highlights the fastest growing profitable companies in Sweden by region.

Just like the graceful and swift animals for which they are named, the annual Gasell companies are making an impact in their industries and on Sweden's business markets. The publication calls its nominees - who are selected by careful review of their business filings -- "the heroes" of Swedish business.

Continue Reading...

Article posted: Oct 16, 2017

By Marcus Hartwig, Versasec GM Americas

Versasec has repeatedly warned that text messages should noy be used as two-factor authentication. Now, Positive Technologies has proved that point decisively but demonstrating the ease of hacking into a bitcoin wallet by intercepting a text message. The Verge reported Positive Technologies posted a video about how easy it is to access a bitcoin wallet by intercepting text messages in transit.

Continue Reading...

Article posted: Oct 11, 2017

By Joakim Thorén, Versasec CEO

In 2007, the iPhone and Amazon's Kindle were introduced (each priced at $399); Skybus launched and boasted one-way flights starting at just $10; the UK banned smoking in public places, and the Boston Red Sox won the world series. It was also the year Versasec made its debut.

Continue Reading...

Article posted: Oct 10, 2017

By Joakim Thorén, Versasec CEO

If you live in the US, it's likely the Equifax breach has affected you personally. While Equifax is still evaluating the cause of the breach, we're already hearing a number of excuses from the company. And the excuses aren't sitting well with Equifax's board, as Chief Security Officer Susan Mauldin and Chief Information Officer Dave Webb are "retiring". According to an article in ZDNet, Equifax is blaming open-source software for its debilitating security breach that compromised 143 million records. Some industry experts may argue that Equifax shouldn't have relied on open source software to protect American's names, social security numbers, birthdates and home addresses. Others feel that by immediately updating security patches, the breach wouldn't have occurred.

Continue Reading...

Article posted: Aug 30, 2017

By Marcus Hartwig, GM Americas

When I saw this headline in the Wall Street Journal recently, "T3rr1bl3 @dv1c3," I couldn't resist reading the article and sharing the regrets of one of the pioneers of secure passwords.

The article includes an interview with Bill Burr, a former manager at the National Institute of Standards and Technology (NIST), discussing how he'd come up with recommendations for secure passwords some 13 years ago. At the time, he says, he was tasked with providing recommendations on the best ways to keep passwords secure for a NIST special publication (800-63, Appendix A). He didn't have much time, so he invented his own rules, he says, putting together an 8-page guide.

Continue Reading...

Article posted: Aug 28, 2017

By Joakim Thorén, CEO

Softshell, one of the leading distributors of cybersecurity systems in Germany, Austria and Switzerland (DACH), highlighted Versasec in its recent "Softshell Vendor Report 2017" that assesses the readiness of vendors to serve customers in the DACH region.

Continue Reading...

Article posted: Aug 23, 2017

By Adam Bostwick, Versasec

Amidst a sea of controversy, the current United States government just made a significant announcement about US cyber security. Covered in Wired Magazine, "the Trump administration will elevate United States Cyber Command, currently a division of the National Security Agency, to the status of a unified military command."

What does this mean for the US?

Continue Reading...

Article posted: Aug 21, 2017

By Yvonne Möbius, HR, Versasec

U.K.-based analyst firm Juniper Research estimates criminal data breaches will cost businesses more than $8 trillion over the next five years. Juniper's new research report, "The Future of Cybercrime & Security: Enterprise Threats & Mitigation 2017-2022," also states that personal records stolen by cybercriminals will reach 2.8 billion in 2017 and almost double to 5 billion in 2020, despite new security technologies to thwart cyberattacks entering the market.

Continue Reading...

Article posted: Aug 17, 2017

By Nick Budden, Versasec Technical Consultant

Verasec has an impressive network of certified partners around the world, and one of the ways we ensure they have a great experience in working with us and with their customers who buy Versasec solutions is with our issuer tool.

Continue Reading...

Article posted: Aug 09, 2017

By Adam Bostwick, Versasec

It's happened again: A third-party contractor has been deemed responsible for the latest, highly-publicized data breach. This time the company hit was Anthem, where a contractor has been charged with emailing a document containing more than 18,500 Anthem members' information to his personal email address. This information included Medicare ID numbers containing social security numbers, Health Plan ID numbers, as well as Medicare contract numbers and enrollment dates.

Continue Reading...

Article posted: Jul 17, 2017

Q&A with Richard Brown, Cogito Managing Director

We're pleased to offer a third installation of our quarterly partner blog series. We recently spoke with Richard Brown, Cogito's Managing Director, and he provided valuable insights on the two-factor authentication market and discussed why Cogito's Jellyfish is gaining in popularity.

Continue Reading...

Article posted: Jul 10, 2017

By William Houry, Vice President of Sales

No matter the industry or its level of security, at least some employees at every enterprise today require access to their corporate networks via mobile devices. Most rely on physical smart cards for user authentication and access, yet there's another low-cost and even simpler solution: Just-in-Time (JIT) virtual smart cards (VSCs) (find more information about smart cards here: https://versasec.com/smart-cards.php).

Continue Reading...

Article posted: Jun 29, 2017

By Joakim Thorén, CEO

The recent Republican National Committee (RNC) data breach took center stage on June 20, 2017 as a huge security misstep. In fact, it was called "the mother lode of all leaks," in a recent article in Business Insider.

Continue Reading...

Article posted: Jun 28, 2017

By Nick Budden, Versasec Technical Consultant

Notch another victory for hackers, courtesy of weak passwords. It appears hackers were able to take down the British Parliament's email system by identifying accounts with weak passwords and breaching them.

Continue Reading...

Article posted: Jun 21, 2017

By Joakim Thorén, CEO

It seems lately that more countries are turning to biometrics to ensure the safety of their borders. This January, Australia vowed it will replace passports as a means of identifying passengers after installing the latest biometric identification platforms, such as facial, iris or fingerprint recognition systems by 2020.

Continue Reading...