Are You Willing to Trade Data Privacy and Security for Convenience?

For those with even a hint of curiosity about data security, it's hard to miss the buzz surrounding the introduction of "Passkeys" and the collaboration between Apple, Microsoft, and Google in their q...
Read more

How to Mitigate the Risks and High Costs of Data Breaches. Part 3

This is the final installment of a multi-part series on the actual costs of data breaches and possible solutions that can be leveraged to protect your organization's data and bottom line. Read Part 1 ...
Read more

In the Age of FIDO, Does SSO Matter?

Preface: A question was raised on a FIDO forum recently on what "best practices" exist for integrating 0Auth2 with FIDO2 to enable Single Sign-On (SSO) to applications. While the poster was seeking a ...
Read more

FIDO 101: Understanding FIDO Strong Authentication and What It Can Do for You

If you'd like to dive deeper into the world of FIDO, we recommend reading our FIDO 201 article, our in-depth guide to FIDO Protocols, and our Evaluation of SCA Methods for PSD2. What Is FIDO? FIDO is ...
Read more

Physical Security for PCI DSS

In cybersecurity we often focus on preventative measures inside the electronics and software we use. Of utmost importance are the procedures surrounding the physical infrastructure: initial deployment...
Read more

An In-depth Guide to FIDO Protocols: U2F, UAF, and WebAuthn (FIDO2)

To learn more about the Alliance, read our FIDO 101 article. Read our FIDO 201 article to learn how FIDO2-based authentication can be deployed using StrongKey's PKI2FIDO web application, and move beyo...
Read more

How to Defeat Ransomware in 4 Easy Steps

With these 4 (somewhat) easy steps, even if your data is ransomed, recovery will become a matter of days rather than months, your recovery costs will drop drastically—and, bonus, customer opinion won'...
Read more

Protecting Connectivity in a 3D-Printed World

The world of industrial manufacturing is finally stepping into the future by capitalizing on the innovations of the 3D-printing revolution. The resulting field of this technological marriage between t...
Read more

Mitigating Data Breaches with ALESA

Question: Aside from eliminating sensitive data from your business process, what are two things you can do to eliminate much of the risk of a data breach? Answer: Application-Level Encryption and Stro...
Read more

Disruptive Defenses Are the Key to Preventing Data Breaches

A report from DLA Piper states that more than 160,000 data breach notifications have been reported across 28 nations in the European Union since the General Data Protection Regulation (GDPR) went into...
Read more