Article posted: Oct 11, 2017

By Joakim Thorén, Versasec CEO

In 2007, the iPhone and Amazon's Kindle were introduced (each priced at $399); Skybus launched and boasted one-way flights starting at just $10; the UK banned smoking in public places, and the Boston Red Sox won the world series. It was also the year Versasec made its debut.

Continue Reading...

Article posted: Aug 17, 2017

By Nick Budden, Versasec Technical Consultant

Verasec has an impressive network of certified partners around the world, and one of the ways we ensure they have a great experience in working with us and with their customers who buy Versasec solutions is with our issuer tool.

Continue Reading...

Article posted: Jul 10, 2017

By William Houry, Vice President of Sales

No matter the industry or its level of security, at least some employees at every enterprise today require access to their corporate networks via mobile devices. Most rely on physical smart cards for user authentication and access, yet there's another low-cost and even simpler solution: Just-in-Time (JIT) virtual smart cards (VSCs) (find more information about smart cards here: https://versasec.com/smart-cards.php).

Continue Reading...

Article posted: Jun 07, 2017

By Joakim Thoren, CEO

It's no surprise that as the numbers of places where voters can make their election choices electronically increase so, too, do concerns around security, reliability, privacy and safety. But when you're in our business, you know that the technology certainly exists to ensure electronic voting addresses every one of those concerns.

Continue Reading...

Article posted: May 25, 2017

By Joakim Thoren, CEO

It's not often that Mashable writes about two-factor authentication (2FA), but it's a sign that personal security is being threatened and organizations and individuals are concerned. The latest malware virus, WannaCry, shocked the security industry and exploited older operating and legacy systems, shutting down hospitals in the UK and large multinational organizations around the world.

Continue Reading...

Article posted: May 18, 2017

By Joakim Thoren, CEO

Everyone is talking about the recent worldwide ransomware cyberattack, named WannaCry. A suitable name as the WannaCry ransomware attack was particularly vicious, shutting down hospitals and disrupting high-profile operations like Telefonica, FedEx and Renault.

According to a recent ECNMag article, this was the "largest ransomware attack observed in history." Europol Chief Rob Wainwright added, "More than 200,000 victims have been hit in 150 countries as of last week."

Continue Reading...

Article posted: May 09, 2017

By Joakim Thoren, CEO

Social engineering is a cybercriminal's best friend. That's according to Juniper Research, which recently published the "Cybercrime and The Internet of Threats 2017" whitepaper. In its report, the Juniper team says that even with evolving methods for attempting unauthorized access of computing systems, the preferred route taken by most hackers is still this: duping users into opening the door. Simply put, cybercrime is often perpetrated through social engineering.

Continue Reading...

Article posted: Mar 01, 2017

By Marcus Hartwig, GM Americas

For more than 20 years, cryptographic hash functions like SHA-1 have played a major role in browser security, managing code repositories or even just detecting duplicate files in storage. SHA-1, or Secure Hash Algorithm 1, was designed by the United States National Security Agency and was published by the United States NIST. We applaud the recent collaboration of the CWI Institute in Amsterdam and Google, which now shows its many flaws and security weaknesses.

Continue Reading...

Article posted: Oct 12, 2016

By Marcus Hartwig, GM Americas

When the National Institute of Standards and Technology (NIST) declared over the summer that SMS-based, two-factor identification should be put into the scrap heap of history, lots of us in the industry breathed a sigh of relief.

Continue Reading...

Article posted: Dec 18, 2015

By Joakim Thorén, CEO

The 10th annual Gartner IAM Summit in Las Vegas focused heavily on the urgency in deploying identity and access management solutions. ZDNet's report on the Summit noted that Gartner called for innovation in the next identity and access management technology revolution, but the story glossed over one of the key issues: widespread deployment of two-factor authentication and IAM.

Continue Reading...