Arshad Noor

Arshad Noor
After 32 years of experience in the Information Technology sector (including nearly two decades of designing and building key management infrastructures for worldwide mission-critical environments), Arshad has redirected his energy into solving bigger problems—like making breaches irrelevant—with StrongKey. He loves to pursue personal fitness and health, which handily offsets his passion for sweets. As Arshad fervently stays abreast of cybersecurity news, he is always ready to engage in a friendly debate about authentication or recent breach news.
Find me on:

Recent Posts

IoT

The Wake-Up Call for Stronger Authentication: California’s IoT Bill SB-327

Along with the California Consumer Protection Act (CCPA), the cybersecurity law CA SB-327 known as the “IoT bill” went into effect January 1, 2020, with enforcement beginning July 1, 2020. While the C...
Read more

A Quick Guide to Addressing CCPA and GDPR: A StrongKey and VerSprite Collaboration

For good or bad, the age of data privacy and security legislation is upon us. New York, India, Washington, Nebraska, Ecuador are but a few governments that have drafted their own legislation following...
Read more

Disruptive Defenses Are the Key to Preventing Data Breaches

A report from DLA Piper states that more than 160,000 data breach notifications have been reported across 28 nations in the European Union since the General Data Protection Regulation (GDPR) went into...
Read more

The Striking Parallels of the Firewall and Blockchain

Thirty years ago, as a U.S. Department of Defense experiment called the internet was to be soon commercialized, companies started to focus on how to protect internal systems and applications from atta...
Read more

Capital One: Chronicle of a Data Breach Foretold

The “data breach of the year” involved more than 100M files containing sensitive information of consumer credit card applications at Capital One. The story hit headlines for months, and with much reas...
Read more

The Thales-Gemalto Merger: What Does It Mean?

As a longtime player in enterprise key management infrastructure, we have been advocating for stronger encryption, authentication and key management for years. We have worked to educate the market on ...
Read more

Duty of Care and Information Security

The Hippocratic oath and the principles embodied in “duty of care” guide the daily actions of healthcare providers. But when it comes to information security and protecting sensitive PHI, is the healt...
Read more

Automating Data Protection Across the Enterprise

Introduction With the unabated growth of the internet, companies are being challenged to protect unprecedented quantities of data from determined and targeted attacks. While security regulations manda...
Read more

Why Software Remains Insecure—and Why It Really Shouldn't

In a recent blog post, Daniel Meissler theorizes that the benefits of quickly building bad software have so far outweighed the downsides. Though this sounds plausible and seductive, there is a more in...
Read more

The Best Data Breach Tactics to Deploy Now

A top-of-mind question for business leaders across all industries is how to eliminate the risk of a data breach. In addition to removing sensitive data from your business process, there are two other ...
Read more