Physical Security for PCI DSS

In cybersecurity we often focus on preventative measures inside the electronics and software we use. Of utmost importance are the procedures surrounding the physical infrastructure: initial deployment...
Read more

An In-depth Guide to FIDO Protocols: U2F, UAF, and WebAuthn (FIDO2)

To learn more about the Alliance, read our FIDO 101 article. Read our FIDO 201 article to learn how FIDO2-based authentication can be deployed using StrongKey's PKI2FIDO web application, and move beyo...
Read more

Chained to the Cloud: an IT Conundrum

Fun fact: There's a business that will accept Bitcoin (and other cryptocurrencies) to let you search supposedly “secure” files in AWS and Azure. AWS and Microsoft cloud contracts clearly explain that ...
Read more

Conclusions for PSD2 SCA

This article is part 7 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

FIDO2 for PSD2 SCA

This article is part 6 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

Smartphone + Biometrics for PSD2 SCA

This article is part 5 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

How to Defeat Ransomware in 4 Easy Steps

With these 4 (somewhat) easy steps, even if your data is ransomed, recovery will become a matter of days rather than months, your recovery costs will drop drastically—and, bonus, customer opinion won'...
Read more

Europay, MasterCard, and Visa (EMV) Readers for PSD2 SCA

This article is part 4 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

A Token for Your Thoughts on Vaultless Tokenization

In our efforts to fulfill our clients’ growing data storage and security demands, we often research new methods to perform our mission and carefully weigh whether or not these discoveries serve our cl...
Read more

Hardware OTP for PSD2 SCA

This article is part 3 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more