Cipher Octopus Cipher Octopus

I saved some Italians from marauders back in the day in Tellaro, and now StrongKey named a slick data privacy solution after the place. Since then you may have seen me using my big brain and complex eyes--and numerous tentacles--to find ways to protect sensitive data using open source tech for as low a price as possible.
Find me on:

Employee Spotlight: Dave Humphreys

Dave Humphreys brings a level of industry expertise that has been a tremendous boon to StrongKey, and we feel like he deserves to know it.  For the month of December, StrongKey is highlighting our Reg...
Read more

Give the Gift of Peace of Mind

Shopping for the more technically minded humans  in your life can be more challenging than catching a lobster with your bare tentacles—especially if you don’t have an inkling about cybersecurity. Neve...
Read more

Employee Spotlight: Suhail Noor

For the month of December, StrongKey is highlighting our Technical Project Manager, Suhail Noor. A California transplant to the Virginia Blue Ridge Mountains, Suhail always has a winning smile and inf...
Read more

Employee Spotlight: Jaylene Miguel

For the month of October, StrongKey is highlighting Billing and Operations Specialist, Jaylene Miguel. Jaylene joined StrongKey in June 2019 as a part-time employee wanting to rejoin the workforce aft...
Read more

Employee Spotlight: Pushkar Marathe

For the month of September, StrongKey is spotlighting Pushkar Marathe, who just celebrated his 10-year anniversary with the company. Aside from being a mainstay on our fitness competition board, he so...
Read more

Employee Spotlight: Pashara Black

Pashara was chosen for our first-ever Employee Spotlight. She has been at StrongKey for over a year now and, among other feats of prowess, was recently selected for the Triangle Business Journal's 202...
Read more

The 4 Ingredients Needed for Securing Data, First

Creating a tight security plan has in the past few years become a concerning aspect of IT for any business, whether established on the scene or just starting up. Traditional security models bring up i...
Read more

Key Custodians: Who, What, Where, When, Why, and How

I have worked with a lot of customers and, without a doubt, the most important and frequently neglected facet of managing an appliance I see is key custodianship. Often neglected and forgotten about, ...
Read more

A Token for Your Thoughts on Vaultless Tokenization

In our efforts to fulfill our clients’ growing data storage and security demands, we often research new methods to perform our mission and carefully weigh whether or not these discoveries serve our cl...
Read more

The 4 Most Important Takeaways for Technical Safeguards and Compliance

StrongKey and Smith Anderson Law recently co-hosted a round table discussion on technical safeguards with approximately 20 executives from industries including government, healthcare, software, IT, an...
Read more