Give the Gift of Peace of Mind

Shopping for the more technically minded humans  in your life can be more challenging than catching a lobster with your bare tentacles—especially if you don’t have an inkling about cybersecurity. Neve...
Read more

Protecting Connectivity in a 3D-Printed World

The world of industrial manufacturing is finally stepping into the future by capitalizing on the innovations of the 3D-printing revolution. The resulting field of this technological marriage between t...
Read more

Employee Spotlight: Suhail Noor

For the month of December, StrongKey is highlighting our Technical Project Manager, Suhail Noor. A California transplant to the Virginia Blue Ridge Mountains, Suhail always has a winning smile and inf...
Read more

Cloudy, with a Chance of Breaches

In an extremely short amount of time, the average person’s familiarity with and usage of the cloud has skyrocketed—both intentionally, and behind the scenes; you can even sip on a cup of coffee made v...
Read more

With Great Data Comes Great Responsibility

Corporations that store consumer data are implicitly given trust by consumers. This is a trust they must maintain or risk losing business accordingly. Proactive—not reactive—measures are the hallmarks...
Read more

The Case for FIDO2: The Most Secure Option on the Market

FIDO2 is the single most impressive piece of technology that can have an impact on human behavior and cybersecurity. Let’s get that out of the way. It’s a bold statement, but we’re going to tell you w...
Read more

Mitigating Data Breaches with ALESA

Question: Aside from eliminating sensitive data from your business process, what are two things you can do to eliminate much of the risk of a data breach? Answer: Application-Level Encryption and Stro...
Read more

Protecting COVID-19 Medical Data Using FIDO

In the world of cyber espionage, the law of supply and demand reigns supreme—so it shouldn't be a surprise that in our pandemic-stricken present, there's no hotter commodity on the current black marke...
Read more

Lessons For IT Professionals From Prominent Security Breaches

Ask a security professional what the acronym "CIA" in data security expands to. If you get the response "confidentiality, integrity, availability," then you'll get an indicator of why the state of cyb...
Read more

Employee Spotlight: Pushkar Marathe

For the month of September, StrongKey is spotlighting Pushkar Marathe, who just celebrated his 10-year anniversary with the company. Aside from being a mainstay on our fitness competition board, he so...
Read more