A. Khedron de León A. Khedron de León

Khedron is the Technical Writer for StrongKey; he also manages many of the web assets, having been a database engineer in a previous life for a Fortune 15 corporation. Khedron enjoys bringing flavorful language and personality to an otherwise misunderstood industry.

It’s Time to Join Big Tech with FIDO2-based Strong Authentication

You might also like: The Case for FIDO2: The Most Secure Option on the Market We live in perilous times, both with regards to our personal health and our online security. Similar to physical viruses l...
Read more

Social Distancing and Payments: CNP and COVID-19

StrongKey fully supports the global effort to stem the spread of COVID-19. With precautions in place, communities across the globe are adjusting to the need for more socially conscious conduct—possibl...
Read more

Are Your Remote Employees Embracing a Culture of Security?

While the world holds its breath for COVID-19 to run its course, many tech workers are out of the office, yet because they are able to work from almost anywhere, it’s still business—just not as usual....
Read more

Risky Business: The Importance of Risk Assessments

Creating a secure home for sensitive data is fast becoming a business requirement, but it is often new ground to cover for many companies. Businesses have varying measures in place ranging from nothin...
Read more

How to Fight Breach Fatigue

The phenomenon becoming known as "breach fatigue" represents a warning against complacency with regard to the prevalence and success of data breaches.
Read more

The Spoils of Ransomware: Turns out, Blockchain Is for Hackers

Ransomware, one of the most flourishing and lucrative attack forms, generally demands payment in BitCoin due to its inherent anonymity and reliability—both found in the blockchain ledger. Since it see...
Read more

Sharing Isn't Caring

Comfortable Breaches to Fit Any Lifestyle Do you travel? Do you prefer to drive or fly? Do you have a favorite hotel chain? Use the same entertainment methods from day to day? How long have you had th...
Read more

Cloud Vector – Cyber Illness, Infection, and How to Contain Them

Infectious Humour Humans have long had strong emotions about the sick, infirm, and deformed. The word monster derives from the Latin word for omen, originating from a time when sick and deformed child...
Read more

The Feedback Loop Inherent in GDPR

GDPR’s “right to be forgotten” has generated some concerning results. The limits and pitfalls of retrieving one’s Personally Identifiable Information (PII) is already creating ripples: being able to o...
Read more

A Deduction of Errors

Hacking by Design As early as 1994, the concept of security by design was beginning to take shape; anticipating malicious intent and incorporating designs to circumvent or altogether exclude scenarios...
Read more