Article posted: Oct 16, 2018

By Joakim Thorén, CEO

It's official: Version 5.3 of vSEC:CMS, a powerful new iteration of our industry-leading identity and access management solution, is now available. This version includes support for additional popular Gemalto eTokens and smart cards, and offers a slew of additional important features, including the ability to speed new user validations and enable license and Operator Store issuance.

Continue Reading...

Article posted: Aug 23, 2018

By Joakim Thorén, CEO

While large enterprises across the US most certainly have sophisticated cybercrime fighting measures in place, the same is not true of many of the nation's small- and medium-sized businesses (SMBs).

That's why the NIST Small Business Cybersecurity Act, S. 770, previously referred to as the Main Street Cybersecurity Act, was signed into law by President Trump last week. S. 770 charges the National Institute of Standards and Technology (NIST), a division of the commerce department, with helping the nation's smaller businesses better prepare for and address the potential of cybercrime through better education. The Act specifically states NIST is to help SMBs "identify, assess, manage and reduce their cybersecurity risks."

Continue Reading...

Article posted: Aug 19, 2016

By John Moran, Director, Minerva Security - VERSASEC GUEST BLOGGER

A lot has been said and written about cloud-based physical security systems, and it raises some questions. For instance, how safe are they? What are the benefits associated with the cloud-based systems? What are some of the challenges? How can physical security systems be integrated to the cloud?

Continue Reading...

Article posted: Sep 01, 2015

Versasec’s CEO Joakim Thorén recently was asked to identify some of the security risks that NFC technology presents for security professionals in Security Technology Executive. The article touches upon the frightening scenarios that NFC affords hackers, demonstrating that common everyday occurrences such as riding the elevator are potential security threats to an organization.

Continue Reading...