Article posted: Aug 17, 2017

By Nick Budden, Versasec Technical Consultant

Verasec has an impressive network of certified partners around the world, and one of the ways we ensure they have a great experience in working with us and with their customers who buy Versasec solutions is with our issuer tool.

Continue Reading...

Article posted: Jul 10, 2017

By William Houry, Vice President of Sales

No matter the industry or its level of security, at least some employees at every enterprise today require access to their corporate networks via mobile devices. Most rely on physical smart cards for user authentication and access, yet there's another low-cost and even simpler solution: Just-in-Time (JIT) virtual smart cards (VSCs) (find more information about smart cards here: https://versasec.com/smart-cards.php).

Continue Reading...

Article posted: Jun 29, 2017

By Joakim Thorén, CEO

The recent Republican National Committee (RNC) data breach took center stage on June 20, 2017 as a huge security misstep. In fact, it was called "the mother lode of all leaks," in a recent article in Business Insider.

Continue Reading...

Article posted: Jun 28, 2017

By Nick Budden, Versasec Technical Consultant

Notch another victory for hackers, courtesy of weak passwords. It appears hackers were able to take down the British Parliament's email system by identifying accounts with weak passwords and breaching them.

Continue Reading...

Article posted: Mar 17, 2017

By Joakim Thoren, CEO

News this week that Russian intelligence officers working with hackers were the masterminds behind the theft of 500 million Yahoo accounts is yet another cautionary tale for those who are not using two-factor authentication to protect their data.

While the salacious nature of foreign governments infiltrating the data of U.S. citizens is making headlines, home-grown hackers can inflict plenty of damage as well. Foreign or domestic, the hackers are out there. They want data and money and whatever else they can take.

Continue Reading...

Article posted: Dec 13, 2016

By Joakim Thoren, CEO

Our late fall 2016 global survey of IT and cybersecurity professionals has turned up some interesting trends for 2017, not the least of which is that more and more companies are and will be using multi-factor authentication to secure their data.

Continue Reading...

Article posted: Oct 12, 2016

By Marcus Hartwig, GM Americas

When the National Institute of Standards and Technology (NIST) declared over the summer that SMS-based, two-factor identification should be put into the scrap heap of history, lots of us in the industry breathed a sigh of relief.

Continue Reading...

Article posted: Oct 06, 2016

By Joakim Thorén, CEO

A recent NetworkWorld blog raised some relevant points about identity management for enterprises. In the article, author and ESG Cybersecurity Analyst Jon Oltsik stresses that "strong authentication is a requirement," saying that "all organizations should have a plan in place for totally eliminating user names and passwords."

Continue Reading...

Article posted: Jun 01, 2016

By Per-Anders Fjärdsäter, CFO

At its 2016 I/O Developer Conference, Google introduced TRUST API, which aims to eliminate passwords on future Android platforms. Google expects to eliminate passwords by mixing in weaker but unique indicators of who you are. These techniques include obvious biometric indicators such as face shape and voice patterns, as well as less obvious ones like how you move, how you type and how you swipe on the screen.

Continue Reading...

Article posted: Oct 08, 2015

By Paul Foley, Professional Services Director and Co-Founder

In part one of this blog, I highlighted the pitfalls of single-factor authentication, using the example of a company being attacked by a disgruntled employee. In that scenario, unhappy Mallory uses the Windows Recovery Tool to find the network credentials of co-workers with whom she shares a workstation. Her intentions are not good.

Continue Reading...