Article posted: Dec 06, 2018

By Jack Foster, VPN Geeks

With the increased allegations of privacy hacking, unauthorized data usage and access, and election interference, cybersecurity software is booming. Considering risks such as ransomware, illegal access of private data and weaponized IoT devices, users are looking for the best ways to protect their sensitive information.

But, the first step to knowing how to improve your data protection levels is to understand the top five myths about cybersecurity.

Continue Reading...

Article posted: Nov 28, 2018

Q&A with Sven Hammar, Board Member, Versasec

In our latest round of Q&A blogs, we interviewed Versasec's newest board member, Sven Hammar, to gain his insights into the overall security landscape in Europe and abroad. In addition to being a strategic member of Versasec's board of directors, Sven is the Chief Product Officer and Founder of Apica Systems, an applications performance company which he founded in 2005. Here's what he had to say:

Continue Reading...

Article posted: Nov 15, 2018

By Joakim Thorén, CEO

From global companies to SMBs, the heart of the workforce today is mobile. In fact, by 2020, the mobile workforce is projected to comprise roughly three-quarters of U.S. employees, according to the Society for Human Resource Management.

While enterprises of all sizes want to maintain the strong two-factor authentication (2FA) they receive from traditional smart cards, most want options that do not involve adding hardware to their mobile devices.

Continue Reading...

Article posted: Oct 16, 2018

By Joakim Thorén, CEO

It's official: Version 5.3 of vSEC:CMS, a powerful new iteration of our industry-leading identity and access management solution, is now available. This version includes support for additional popular Gemalto eTokens and smart cards, and offers a slew of additional important features, including the ability to speed new user validations and enable license and Operator Store issuance.

Continue Reading...

Article posted: Jul 25, 2018

By Adam Bostwick, Business Development

When Microsoft announced it would cease support for its Forefront Identity Manager (FIM), its identity and access card management system, and its successor product, Microsoft Identity Manager (MIM), we geared up to help those customers seamlessly migrate from FIM/MIM to the Versasec vSEC:CMS.

Continue Reading...

Article posted: Jul 18, 2018

By Joakim Thorén, CEO

Cisco's 2018 Annual Cybersecurity Report points out that mobile devices are the most difficult to protect. That's in large part because of increased use of Bring Your Own Devices (BYOD) into the workplace. While organizations can save up to $350 per phone, per employee, by allowing the use of BYOD devices, there are inherent security challenges. When employees download apps from questionable gaming sites that are more likely to be breached, they leave a window for hackers to enter corporate servers and steal valuable organizational data.

Continue Reading...

Article posted: Jul 17, 2018

By Joakim Thorén, CEO

We're committed to building strategic partnerships with the best security companies around the globe. Today, we announced today our new technology partnership with Identiv, a global provider of physical security and secure identification solutions.

Continue Reading...

Article posted: Jul 10, 2018

By Joakim Thorén, CEO

We're delighted to announce Sven Hammar has joined our Board of Directors. He was named to the post at our company's annual general meeting last month. On a personal level, I couldn't be more pleased. Sven has been a friend and mentor to me for many years. For Versasec, landing someone who is a noted industry luminary is a major coup.

Continue Reading...

Article posted: Apr 19, 2018

By Joakim Thorén, CEO

The RSA Conference 2018 this week in San Francisco was our launching pad for vSEC:CMS S-Series Version 5.1. This latest upgrade to our identity and access management (IAM) solution has a strong focus on Virtual Smart Cards, TPM management, and Remote Security Device Management (RSDM) functionality, making it increasingly relevant in the Internet of Things (IOT) space.

Continue Reading...

Article posted: Dec 11, 2017

Q&A with Jeff Ciraulo, President, Envoy Data Corporation

We're pleased to offer a fourth installation of our quarterly partner blog series. We recently spoke with Jeff Ciraulo, Envoy Data Corporation's President, and he provided valuable insights on the two-factor authentication market and discussed why cloud services will need strong two-factor identification.

Continue Reading...

Article posted: Aug 17, 2017

By Nick Budden, Partner and Security Expert at Versasec

Verasec has an impressive network of certified partners around the world, and one of the ways we ensure they have a great experience in working with us and with their customers who buy Versasec solutions is with our issuer tool.

Continue Reading...

Article posted: Jul 10, 2017

By William Houry, Vice President of Sales

No matter the industry or its level of security, at least some employees at every enterprise today require access to their corporate networks via mobile devices. Most rely on physical smart cards for user authentication and access, yet there's another low-cost and even simpler solution: Just-in-Time (JIT) virtual smart cards (VSCs) (find more information about smart cards here: https://versasec.com/smart-cards.php).

Continue Reading...

Article posted: Jun 21, 2017

By Joakim Thorén, CEO

It seems lately that more countries are turning to biometrics to ensure the safety of their borders. This January, Australia vowed it will replace passports as a means of identifying passengers after installing the latest biometric identification platforms, such as facial, iris or fingerprint recognition systems by 2020.

Continue Reading...

Article posted: Jun 07, 2017

By Joakim Thoren, CEO

It's no surprise that as the numbers of places where voters can make their election choices electronically increase so, too, do concerns around security, reliability, privacy and safety. But when you're in our business, you know that the technology certainly exists to ensure electronic voting addresses every one of those concerns.

Continue Reading...

Article posted: May 03, 2017

By Nick Budden, Partner and Security Expert at Versasec

A recent BBC.com article pointed out Public Key Cryptography (PKI), created by researchers at Stanford University in 1977, is celebrating its 40th birthday. The findings of the Stanford team were nearly silenced by a US government agency at the time, which viewed this research as "legally equivalent to exporting nuclear arms to a hostile foreign power."

But why did the US think that sharing PKI research was so damaging to national security?

Continue Reading...

Article posted: Apr 17, 2017

By Joakim Thoren, CEO

Version 4.8 of our flagship product, vSEC:CMS is here, and this latest version incorporates more options for managing security credentials on the user side. In the latest iteration of the vSEC:CMS S-Series, the primary changes our customers will see relate to user self-service improvements.

Continue Reading...

Article posted: Apr 12, 2017

By Joakim Thoren, CEO

Cities in tornado zones have emergency sirens for a reason: to alert their populations of impending potential major storms, hail or other emergency situations either in the city or in surrounding environs. So, imagine the sheer panic raised when all 156 of Dallas' tornado sirens were sounding for approximately 90 minutes during the wee hours of the night over this past weekend.

Continue Reading...

Article posted: Apr 11, 2017

By Joakim Thoren, CEO

Analyst research firm International Data Corporation (IDC) says companies are prepared to spend more money on their security this year. Its recently updated Worldwide Semiannual Security Spending Guide, forecasts worldwide revenue for security-related hardware, software and services will reach $81.7 billion in 2017, an increase of 8.2 percent over 2016. IDC's Spending Guides provide a granular view of key technology markets from a regional, vertical industry use case, buyer, and technology perspective.

Continue Reading...

Article posted: Mar 17, 2017

By Joakim Thoren, CEO

News this week that Russian intelligence officers working with hackers were the masterminds behind the theft of 500 million Yahoo accounts is yet another cautionary tale for those who are not using two-factor authentication to protect their data.

While the salacious nature of foreign governments infiltrating the data of U.S. citizens is making headlines, home-grown hackers can inflict plenty of damage as well. Foreign or domestic, the hackers are out there. They want data and money and whatever else they can take.

Continue Reading...

Article posted: Mar 10, 2017

By Marcus Hartwig, GM Americas

Google's Nest thermostat and other consumer IoT devices are flooding the market. By 2020, Cisco predicts 50 billion IoT devices will be connected. Not surprisingly, security is a major concern for these connected devices. After all, no one likes the idea of hackers infiltrating smart devices, like DVRs or cameras, the very devices that were hacked to bring down DynDNS last October.

Continue Reading...