Arshad Noor Arshad Noor

After 32 years of experience in the Information Technology sector (including nearly two decades of designing and building key management infrastructures for worldwide mission-critical environments), Arshad has redirected his energy into solving bigger problems—like making breaches irrelevant—with StrongKey. He loves to pursue personal fitness and health, which handily offsets his passion for sweets. As Arshad fervently stays abreast of cybersecurity news, he is always ready to engage in a friendly debate about authentication or recent breach news.
Find me on:

“Would you trust your bank with both keys to your safe deposit box?”

“Huh?” Bob responded. He looked up from the newspaper as Alice and he were at the kitchen table finishing breakfast. Alice put down her tablet computer and looked at him. “I mean: You go to a bank to ...
Read more

In the Age of FIDO, Does SSO Matter?

Preface: A question was raised on a FIDO forum recently on what "best practices" exist for integrating 0Auth2 with FIDO2 to enable Single Sign-On (SSO) to applications. While the poster was seeking a ...
Read more

Physical Security for PCI DSS

In cybersecurity we often focus on preventative measures inside the electronics and software we use. Of utmost importance are the procedures surrounding the physical infrastructure: initial deployment...
Read more

Chained to the Cloud: an IT Conundrum

Fun fact: There's a business that will accept Bitcoin (and other cryptocurrencies) to let you search supposedly “secure” files in AWS and Azure. AWS and Microsoft cloud contracts clearly explain that ...
Read more

The Case for FIDO2: The Most Secure Option on the Market

FIDO2 is the single most impressive piece of technology that can have an impact on human behavior and cybersecurity. Let’s get that out of the way. It’s a bold statement, but we’re going to tell you w...
Read more

Mitigating Data Breaches with ALESA

Question: Aside from eliminating sensitive data from your business process, what are two things you can do to eliminate much of the risk of a data breach? Answer: Application-Level Encryption and Stro...
Read more

Lessons For IT Professionals From Prominent Security Breaches

Ask a security professional what the acronym "CIA" in data security expands to. If you get the response "confidentiality, integrity, availability," then you'll get an indicator of why the state of cyb...
Read more

The Wake-Up Call for Stronger Authentication: California’s IoT Bill SB-327

Along with the California Consumer Protection Act (CCPA), the cybersecurity law CA SB-327 known as the “IoT bill” went into effect January 1, 2020, with enforcement beginning July 1, 2020. While the C...
Read more

A Quick Guide to Addressing CCPA and GDPR: A StrongKey and VerSprite Collaboration

You might also like: The Economics of FIDO For good or bad, the age of data privacy and security legislation is upon us. New York, India, Washington, Nebraska, Ecuador are but a few governments that h...
Read more

Disruptive Defenses Are the Key to Preventing Data Breaches

A report from DLA Piper states that more than 160,000 data breach notifications have been reported across 28 nations in the European Union since the General Data Protection Regulation (GDPR) went into...
Read more