Mitigating Data Breaches with ALESA

Question: Aside from eliminating sensitive data from your business process, what are two things you can do to eliminate much of the risk of a data breach? Answer: Application-Level Encryption and Stro...
Read more

Protecting COVID-19 Medical Data Using FIDO

In the world of cyber espionage, the law of supply and demand reigns supreme—so it shouldn't be a surprise that in our pandemic-stricken present, there's no hotter commodity on the current black marke...
Read more

Lessons For IT Professionals From Prominent Security Breaches

Ask a security professional what the acronym "CIA" in data security expands to. If you get the response "confidentiality, integrity, availability," then you'll get an indicator of why the state of cyb...
Read more

Employee Spotlight: Pushkar Marathe

For the month of September, StrongKey is spotlighting Pushkar Marathe, who just celebrated his 10-year anniversary with the company. Aside from being a mainstay on our fitness competition board, he so...
Read more

Voice of the Future

HELLO, COMPUTER? The landscape around payments processing is a convoluted, pockmarked patchwork with hazy bogs of uncertainty parked right beside towering bastions of safety and confidence. Increasing...
Read more

Twitter Hack in Bitcoin Scam Reveals Fundamental Security Flaw

Back in July 2006 when Twitter, then known as Twtrr, was unleashed onto the unsuspecting public, the world was a simpler and gentler place. President Bush rolled out an anticipatory in case Flu Pandem...
Read more

Diversity + Inclusion Improves the Bottom Line

This past week, I moderated a panel on how diversity and inclusion improves the bottom line at the North Carolina Tech Association’s Diversity + Inclusion Virtual Summit. Panelists included executives...
Read more

The Wake-Up Call for Stronger Authentication: California’s IoT Bill SB-327

Along with the California Consumer Protection Act (CCPA), the cybersecurity law CA SB-327 known as the “IoT bill” went into effect January 1, 2020, with enforcement beginning July 1, 2020. While the C...
Read more

A Quick Guide to Addressing CCPA and GDPR: A StrongKey and VerSprite Collaboration

You might also like: The Economics of FIDO For good or bad, the age of data privacy and security legislation is upon us. New York, India, Washington, Nebraska, Ecuador are but a few governments that h...
Read more

FIDO 201: Moving beyond PKI and PIV Card Authentication with PKI2FIDO

If you're new to the world of the FIDO Alliance, we recommend reading our FIDO 101 article, and our in-depth guide to FIDO Protocols.
Read more