Cipher Octopus Cipher Octopus

I saved some Italians from marauders back in the day in Tellaro, and now StrongKey named a slick data privacy solution after the place. Since then you may have seen me using my big brain and complex eyes--and numerous tentacles--to find ways to protect sensitive data using open source tech for as low a price as possible.
Find me on:

The 4 Ingredients Needed for Securing Data, First

Creating a tight security plan has in the past few years become a concerning aspect of IT for any business, whether established on the scene or just starting up. Traditional security models bring up i...
Read more

Key Custodians: Who, What, Where, When, Why, and How

I have worked with a lot of customers and, without a doubt, the most important and frequently neglected facet of managing an appliance I see is key custodianship. Often neglected and forgotten about, ...
Read more

The 4 Most Important Takeaways for Technical Safeguards and Compliance

StrongKey and Smith Anderson Law recently co-hosted a round table discussion on technical safeguards with approximately 20 executives from industries including government, healthcare, software, IT, an...
Read more

The Two Network Security Tools Your Mid-Sized Business Needs

Encryption and authentication — let's learn more about why your company needs these security tools. Because IT staff and resources are often sparse within mid-sized businesses, they see the public clo...
Read more

DevSecOps Begins at the Application Layer

In the fast-moving world of DevOps, security sometimes got left by the wayside on the way to the next iteration. But today's threat landscape is so perilous that developers need to have solid security...
Read more

Do Cryptographic Keys Belong in The Cloud?

Thanks to the cloud, organizations of all sizes can enjoy scalability, ease of use, and significant savings by outsourcing hardware and software ownership and maintenance in multi-tenant environments....
Read more

Three Ways to Get a Head Start in the Age of Privacy

There is a lot to think about with the impending Age of Privacy hanging over all of us. As written in Corporate Compliance Insights, there are three key steps to take when considering how to improve y...
Read more

An In-Depth Guide to FIDO Protocols: U2F, UAF, and WebAuthn (FIDO2)

To learn more about the Alliance, read our FIDO 101 article. Read our FIDO 201 article to learn how FIDO2-based authentication can be deployed using StrongKey's PKI2FIDO web application, and move beyo...
Read more

FIDO 101: Understanding FIDO Strong Authentication and What It Can Do for You

If you'd like to dive deeper into the world of FIDO, we recommend reading our FIDO 201 article, our in-depth guide to FIDO Protocols, and our Evaluation of SCA Methods for PSD2. What Is FIDO? FIDO is ...
Read more