Cloudy, with a Chance of Breaches

In an extremely short amount of time, the average person’s familiarity with and usage of the cloud has skyrocketed—both intentionally, and behind the scenes; you can even sip on a cup of coffee made v...
Read more

With Great Data Comes Great Responsibility

Corporations that store consumer data are implicitly given trust by consumers. This is a trust they must maintain or risk losing business accordingly. Proactive—not reactive—measures are the hallmarks...
Read more

Employee Spotlight: Jaylene Miguel

For the month of October, StrongKey is highlighting Billing and Operations Specialist, Jaylene Miguel. Jaylene joined StrongKey in June 2019 as a part-time employee wanting to rejoin the workforce aft...
Read more

The Case for FIDO2: The Most Secure Option on the Market

FIDO2 is the single most impressive piece of technology that can have an impact on human behavior and cybersecurity. Let’s get that out of the way. It’s a bold statement, but we’re going to tell you w...
Read more

Employee Spotlight: Norman Field

For the month of October, StrongKey is highlighting Solutions Architect, Norman Field. You may recognize Norman from some of our webinars like, Passwordless Authentication: How It Works and Why You Ne...
Read more

Employee Spotlight: Pushkar Marathe

For the month of September, StrongKey is spotlighting Pushkar Marathe, who just celebrated his 10-year anniversary with the company. Aside from being a mainstay on our fitness competition board, he so...
Read more

Employee Spotlight: Pashara Black

Pashara was chosen for our first-ever Employee Spotlight. She has been at StrongKey for over a year now and, among other feats of prowess, was recently selected for the Triangle Business Journal's 202...
Read more

Diversity + Inclusion Improves the Bottom Line

This past week, I moderated a panel on how diversity and inclusion improves the bottom line at the North Carolina Tech Association’s Diversity + Inclusion Virtual Summit. Panelists included executives...
Read more

What You Need to Know about California’s Blockchain Working Group

UPDATE (11/11/2019): A high-level summary of key themes identified by the Blockchain Working Group members has been published. You can access the report here. “Blockchain.” We can say with almost full...
Read more

9 Steps to Mitigate Security Risks for Remote Workers

COVID-19 has ushered forth a grand work-from-home experiment for the U.S. and much of the world. Some occupations  do not lend themselves to remote work, and we should all salute those who continue to...
Read more