Article posted: Oct 16, 2017

By Marcus Hartwig, Versasec GM Americas

Versasec has repeatedly warned that text messages should noy be used as two-factor authentication. Now, Positive Technologies has proved that point decisively but demonstrating the ease of hacking into a bitcoin wallet by intercepting a text message. The Verge reported Positive Technologies posted a video about how easy it is to access a bitcoin wallet by intercepting text messages in transit.

Continue Reading...

Article posted: Oct 10, 2017

By Joakim Thorén, Versasec CEO

If you live in the US, it's likely the Equifax breach has affected you personally. While Equifax is still evaluating the cause of the breach, we're already hearing a number of excuses from the company. And the excuses aren't sitting well with Equifax's board, as Chief Security Officer Susan Mauldin and Chief Information Officer Dave Webb are "retiring". According to an article in ZDNet, Equifax is blaming open-source software for its debilitating security breach that compromised 143 million records. Some industry experts may argue that Equifax shouldn't have relied on open source software to protect American's names, social security numbers, birthdates and home addresses. Others feel that by immediately updating security patches, the breach wouldn't have occurred.

Continue Reading...

Article posted: Aug 30, 2017

By Marcus Hartwig, GM Americas

When I saw this headline in the Wall Street Journal recently, "T3rr1bl3 @dv1c3," I couldn't resist reading the article and sharing the regrets of one of the pioneers of secure passwords.

The article includes an interview with Bill Burr, a former manager at the National Institute of Standards and Technology (NIST), discussing how he'd come up with recommendations for secure passwords some 13 years ago. At the time, he says, he was tasked with providing recommendations on the best ways to keep passwords secure for a NIST special publication (800-63, Appendix A). He didn't have much time, so he invented his own rules, he says, putting together an 8-page guide.

Continue Reading...

Article posted: Aug 17, 2017

By Nick Budden, Versasec Technical Consultant

Verasec has an impressive network of certified partners around the world, and one of the ways we ensure they have a great experience in working with us and with their customers who buy Versasec solutions is with our issuer tool.

Continue Reading...

Article posted: Aug 09, 2017

By Adam Bostwick, Versasec

It's happened again: A third-party contractor has been deemed responsible for the latest, highly-publicized data breach. This time the company hit was Anthem, where a contractor has been charged with emailing a document containing more than 18,500 Anthem members' information to his personal email address. This information included Medicare ID numbers containing social security numbers, Health Plan ID numbers, as well as Medicare contract numbers and enrollment dates.

Continue Reading...

Article posted: Jul 17, 2017

Q&A with Richard Brown, Cogito Managing Director

We're pleased to offer a third installation of our quarterly partner blog series. We recently spoke with Richard Brown, Cogito's Managing Director, and he provided valuable insights on the two-factor authentication market and discussed why Cogito's Jellyfish is gaining in popularity.

Continue Reading...

Article posted: Jul 10, 2017

By William Houry, Vice President of Sales

No matter the industry or its level of security, at least some employees at every enterprise today require access to their corporate networks via mobile devices. Most rely on physical smart cards for user authentication and access, yet there's another low-cost and even simpler solution: Just-in-Time (JIT) virtual smart cards (VSCs) (find more information about smart cards here: https://versasec.com/smart-cards.php).

Continue Reading...

Article posted: Jun 29, 2017

By Joakim Thorén, CEO

The recent Republican National Committee (RNC) data breach took center stage on June 20, 2017 as a huge security misstep. In fact, it was called "the mother lode of all leaks," in a recent article in Business Insider.

Continue Reading...

Article posted: Jun 28, 2017

By Nick Budden, Versasec Technical Consultant

Notch another victory for hackers, courtesy of weak passwords. It appears hackers were able to take down the British Parliament's email system by identifying accounts with weak passwords and breaching them.

Continue Reading...

Article posted: Jun 21, 2017

By Joakim Thorén, CEO

It seems lately that more countries are turning to biometrics to ensure the safety of their borders. This January, Australia vowed it will replace passports as a means of identifying passengers after installing the latest biometric identification platforms, such as facial, iris or fingerprint recognition systems by 2020.

Continue Reading...

Article posted: Jun 19, 2017

By Anders Adolfsson, Technical Consultant

Keeping your admin rights current is a necessity today. Verelox, a provider of dedicated KVM and VPS servers based in The Hague, Netherlands, is a good case in point. The company recently endured a devastating data outage after a former administrator deleted all customer data and wiped most of the company's servers, per Bleeping Computer.

Continue Reading...

Article posted: Jun 07, 2017

By Joakim Thoren, CEO

It's no surprise that as the numbers of places where voters can make their election choices electronically increase so, too, do concerns around security, reliability, privacy and safety. But when you're in our business, you know that the technology certainly exists to ensure electronic voting addresses every one of those concerns.

Continue Reading...

Article posted: May 31, 2017

By Joakim Thoren, CEO

This week, Fortune reported Target reached an $18.5 million settlement with 47 states and the District of Columbia over a massive data breach in late 2013. The hits keep coming for Target: over the past four years, the mega retailer has shelled out $202 million as part of this costly data breach.

Continue Reading...

Article posted: May 25, 2017

By Joakim Thoren, CEO

It's not often that Mashable writes about two-factor authentication (2FA), but it's a sign that personal security is being threatened and organizations and individuals are concerned. The latest malware virus, WannaCry, shocked the security industry and exploited older operating and legacy systems, shutting down hospitals in the UK and large multinational organizations around the world.

Continue Reading...

Article posted: May 03, 2017

By Nick Budden, Partner and Security Expert at Versasec

A recent BBC.com article pointed out Public Key Cryptography (PKI), created by researchers at Stanford University in 1977, is celebrating its 40th birthday. The findings of the Stanford team were nearly silenced by a US government agency at the time, which viewed this research as "legally equivalent to exporting nuclear arms to a hostile foreign power."

But why did the US think that sharing PKI research was so damaging to national security?

Continue Reading...

Article posted: Apr 17, 2017

By Joakim Thoren, CEO

Version 4.8 of our flagship product, vSEC:CMS is here, and this latest version incorporates more options for managing security credentials on the user side. In the latest iteration of the vSEC:CMS S-Series, the primary changes our customers will see relate to user self-service improvements.

Continue Reading...

Article posted: Apr 12, 2017

By Joakim Thoren, CEO

Cities in tornado zones have emergency sirens for a reason: to alert their populations of impending potential major storms, hail or other emergency situations either in the city or in surrounding environs. So, imagine the sheer panic raised when all 156 of Dallas' tornado sirens were sounding for approximately 90 minutes during the wee hours of the night over this past weekend.

Continue Reading...

Article posted: Apr 11, 2017

By Joakim Thoren, CEO

Analyst research firm International Data Corporation (IDC) says companies are prepared to spend more money on their security this year. Its recently updated Worldwide Semiannual Security Spending Guide, forecasts worldwide revenue for security-related hardware, software and services will reach $81.7 billion in 2017, an increase of 8.2 percent over 2016. IDC's Spending Guides provide a granular view of key technology markets from a regional, vertical industry use case, buyer, and technology perspective.

Continue Reading...

Article posted: Mar 22, 2017

Q&A with Tomas Gustavsson, PrimeKey CTO

Here at Versasec, we're building strong partnerships with the security industry's leading companies, including PrimeKey. Recently, we sat down with Tomas Gustavsson, CTO at PrimeKey, and asked him a series of questions. Here's Mr. Gustavsson's perspective on two-factor authentication, PKI, IAM and more.

Continue Reading...

Article posted: Mar 17, 2017

By Joakim Thoren, CEO

News this week that Russian intelligence officers working with hackers were the masterminds behind the theft of 500 million Yahoo accounts is yet another cautionary tale for those who are not using two-factor authentication to protect their data.

While the salacious nature of foreign governments infiltrating the data of U.S. citizens is making headlines, home-grown hackers can inflict plenty of damage as well. Foreign or domestic, the hackers are out there. They want data and money and whatever else they can take.

Continue Reading...