August 22, 2019

A Deduction of Errors

Hacking by Design

As early as 1994, the concept of security by design was beginning to take shape; anticipating malicious intent and incorporating designs to circumvent or altogether exclude scenarios exploiting vulnerabilities in software—and to..

August 20, 2019

The 4 Ingredients Needed for Securing Data, First

Creating a tight security plan has in the past few years become a concerning aspect of IT for any business, whether established on the scene or just starting up. Traditional security models bring up images of fortresses and safes—walled..

August 14, 2019

Jake Kiser, COO of StrongKey, Honored with 2019 C-Suite Award by the Triangle Business Journal

The TBJ C-Suite Awards honors the top 15 C-level executives annually in the Triangle community.

August 13, 2019

GDPROI

So, in light of the growing frequency of massive breaches—at the time of this writing, Capital One’s 100M-record breach was the most recent—you’ve decided to take responsibility for the relationships you hold with customers—to protect the trust..

August 12, 2019

Key Custodians: Who, What, Where, When, Why, and How

I have worked with a lot of customers and, without a doubt, the most important and frequently neglected facet of managing an appliance I see is key custodianship. Often neglected and forgotten about, the role and accompanying credential is the..

July 31, 2019

Self-Worth: the Cost of Identity

The Weighted Scales of Justice

In 2012, BlueCross BlueShield (BCBS) of Tennessee paid $1.5M to cover the 2009 breach of 1 million patients’ data—about $1.50 a person. Counting the $17M spent on analysis and recovery, they still only lost $18.50 a..

July 30, 2019

Arshad Noor, CTO of StrongKey, accepted into Forbes Technology Council

Forbes Technology Council Is an Invitation-Only Community for World-Class CIOs, CTOs, and Technology Executives.

June 18, 2019

StrongKey Joins Infineon Security Partner Network to Provide IoT Device Identity Management

Combination of Identity Management Solutions and Trusted Platform Modules Offers Secure Device Identity and Management

May 16, 2019

A Token for Your Thoughts on Vaultless Tokenization

In our efforts to fulfill our clients’ growing data storage and security demands, we often research new methods to perform our mission and carefully weigh whether or not these discoveries serve our clients’ best interests. Encryption schemes come..