Article posted: Aug 21, 2017

By Yvonne Möbius, HR, Versasec

U.K.-based analyst firm Juniper Research estimates criminal data breaches will cost businesses more than $8 trillion over the next five years. Juniper's new research report, "The Future of Cybercrime & Security: Enterprise Threats & Mitigation 2017-2022," also states that personal records stolen by cybercriminals will reach 2.8 billion in 2017 and almost double to 5 billion in 2020, despite new security technologies to thwart cyberattacks entering the market.

Continue Reading...

Article posted: Jul 10, 2017

By William Houry, Vice President of Sales

No matter the industry or its level of security, at least some employees at every enterprise today require access to their corporate networks via mobile devices. Most rely on physical smart cards for user authentication and access, yet there's another low-cost and even simpler solution: Just-in-Time (JIT) virtual smart cards (VSCs) (find more information about smart cards here:

Continue Reading...

Article posted: Aug 18, 2016

By Joakim Thorén, CEO

Small- and medium-sized businesses today are firmly in the sights of hackers. And, unfortunately, password protection alone simply is not good enough to keep data safe.

Continue Reading...

Article posted: Mar 30, 2016

We've released the findings from our first annual Versasec Security Survey, which polled IT security professionals around the globe on their security concerns and spending habits for 2016. Lots of SMEs participated, with nearly 75 percent of the respondents saying they work for companies with fewer than 1,000 employees.

Continue Reading...

Article posted: Mar 28, 2016

Whether you're an existing Versasec customer, a prospective customer or someone who is interested in learning more about the identity and access management (IAM) space, we've got a video we'd like you to watch. It's educational, illuminating and even refreshing. Here's why:

Continue Reading...

Article posted: Jan 08, 2016

By William Houry, VP of Sales, Versasec

The year 2015 was rather illustrious for cyberattacks, with hacks both famous and even infamous. Among the most notable attacks – some for the sheer numbers of victims, some for who was hacked, and some for both – were the following:

Continue Reading...