Article posted: Dec 20, 2018
By Anders Adolfsson, Technical Consultant
As many as 500 million guests of the Starwood Hotel chain may already be or soon will be cursing their choice of hotels. That's because they've received news in recent weeks their private information may have been hacked through Starwood's guest reservation database.
Article posted: Jul 10, 2017
By William Houry, Vice President of Sales
No matter the industry or its level of security, at least some employees at every enterprise today require access to their corporate networks via mobile devices. Most rely on physical smart cards for user authentication and access, yet there's another low-cost and even simpler solution: Just-in-Time (JIT) virtual smart cards (VSCs) (find more information about smart cards here: https://versasec.com/smart-cards.php).
Article posted: Mar 01, 2017
By Marcus Hartwig, GM Americas
For more than 20 years, cryptographic hash functions like SHA-1 have played a major role in browser security, managing code repositories or even just detecting duplicate files in storage. SHA-1, or Secure Hash Algorithm 1, was designed by the United States National Security Agency and was published by the United States NIST. We applaud the recent collaboration of the CWI Institute in Amsterdam and Google, which now shows its many flaws and security weaknesses.
Article posted: Dec 04, 2015
By Joakim Thorén, CEO
Information is Beautiful identified the biggest data security breaches since AOL's massive security blunder which compromised 92 million records in 2005. Interestingly, it seems there were at least a dozen breaches each year where hundreds of millions of records were compromised in retail, financial services, government, medical organizations and other industries. As in the AOL case, some of the most severe security leaks were attributed to lost or stolen equipment or insider threats.
Article posted: Nov 01, 2015
By Joakim Thorén, CEO
Your home provides shelter for your family and likely houses important documents, maybe some cash and jewelry, and perhaps the rare stamp collection you inherited from your Uncle Stanley. You want all of these things to be protected, so you visit a locksmith and purchase the best lock money can buy for your front door. You like the lock so much you put one on the back door, too.