Biometrics Brings Us One Step Closer to Eliminating Passwords for Good

There are two primary means of authentication in use today: basic and multifactor. With basic authentication, the user ID and password are the most common. Recently, however, you have likely seen the ...
Read more

A Token for Your Thoughts on Vaultless Tokenization

In our efforts to fulfill our clients’ growing data storage and security demands, we often research new methods to perform our mission and carefully weigh whether or not these discoveries serve our cl...
Read more

The 4 Most Important Takeaways for Technical Safeguards and Compliance

StrongKey and Smith Anderson Law recently co-hosted a round table discussion on technical safeguards with approximately 20 executives from industries including government, healthcare, software, IT, an...
Read more

TLS: Too Little Security

This article assumes basic knowledge of SSL, TLS, and how those support secure web browsing. For a thorough overview or just a refresher, check out this resource. Around the turn of the century, some ...
Read more

The Thales-Gemalto Merger: What Does It Mean?

As a longtime player in enterprise key management infrastructure, we have been advocating for stronger encryption, authentication and key management for years. We have worked to educate the market on ...
Read more

Duty of Care and Information Security

The Hippocratic oath and the principles embodied in “duty of care” guide the daily actions of healthcare providers. But when it comes to information security and protecting sensitive PHI, is the healt...
Read more

The Two Network Security Tools Your Mid-Sized Business Needs

Encryption and authentication — let's learn more about why your company needs these security tools. Because IT staff and resources are often sparse within mid-sized businesses, they see the public clo...
Read more

DevSecOps Begins at the Application Layer

In the fast-moving world of DevOps, security sometimes got left by the wayside on the way to the next iteration. But today's threat landscape is so perilous that developers need to have solid security...
Read more

Automating Data Protection Across the Enterprise

Introduction With the unabated growth of the internet, companies are being challenged to protect unprecedented quantities of data from determined and targeted attacks. While security regulations manda...
Read more

The Two Most Important Steps to Keep Your Data Secure

Although we all recognize that keeping our data safe is important and encryption is something we've probably heard about, how many of us really understand what that means? I know I'm learning more eve...
Read more