Social Distancing and Payments: CNP and COVID-19

StrongKey fully supports the global effort to stem the spread of COVID-19. With precautions in place, communities across the globe are adjusting to the need for more socially conscious conduct—possibl...
Read more

Are Your Remote Employees Embracing a Culture of Security?

While the world holds its breath for COVID-19 to run its course, many tech workers are out of the office, yet because they are able to work from almost anywhere, it’s still business—just not as usual....
Read more

What North Carolina Brought to the Table at RSA Conference

RSA Conference is where the world comes to talk cybersecurity. Even with the looming threat of the coronavirus, techies from around the world gathered in downtown San Francisco to learn about the late...
Read more

Risky Business: The Importance of Risk Assessments

Creating a secure home for sensitive data is fast becoming a business requirement, but it is often new ground to cover for many companies. Businesses have varying measures in place ranging from nothin...
Read more

5 Things to Know before Attending RSA Conference 2020

RSA Conference is security’s biggest event of the year, and there’s 45,000 techies landing in San Francisco to prove it. You can expect five full days of educational trainings with hundreds of expert-...
Read more

PCI DSS Compliance: Only 1 out of 3 Companies Are Properly Protecting Credit Card Data

LAST UPDATED: 06/05/2020 “We’ve been breached and millions of records are in the hands of attackers. But don’t worry; we promise to do better.”
Read more

Why Every Black Person in Tech Should Attend AfroTech

It’s been a little over a week since I returned from Wakanda. No, not the fictional nation in the Marvel Comics series, but a real one. If you are familiar with Marvel's Black Panther, Wakanda is a fi...
Read more

The Striking Parallels of the Firewall and Blockchain

Thirty years ago, as a U.S. Department of Defense experiment called the internet was to be soon commercialized, companies started to focus on how to protect internal systems and applications from atta...
Read more

How to Fight Breach Fatigue

The phenomenon becoming known as "breach fatigue" represents a warning against complacency with regard to the prevalence and success of data breaches.
Read more

The Spoils of Ransomware: Turns out, Blockchain Is for Hackers

Ransomware, one of the most flourishing and lucrative attack forms, generally demands payment in BitCoin due to its inherent anonymity and reliability—both found in the blockchain ledger. Since it see...
Read more