Physical Security for PCI DSS

In cybersecurity we often focus on preventative measures inside the electronics and software we use. Of utmost importance are the procedures surrounding the physical infrastructure: initial deployment...
Read more

An In-depth Guide to FIDO Protocols: U2F, UAF, and WebAuthn (FIDO2)

To learn more about the Alliance, read our FIDO 101 article. Read our FIDO 201 article to learn how FIDO2-based authentication can be deployed using StrongKey's PKI2FIDO web application, and move beyo...
Read more

How to Defeat Ransomware in 4 Easy Steps

With these 4 (somewhat) easy steps, even if your data is ransomed, recovery will become a matter of days rather than months, your recovery costs will drop drastically—and, bonus, customer opinion won'...
Read more

Protecting Connectivity in a 3D-Printed World

The world of industrial manufacturing is finally stepping into the future by capitalizing on the innovations of the 3D-printing revolution. The resulting field of this technological marriage between t...
Read more

Mitigating Data Breaches with ALESA

Question: Aside from eliminating sensitive data from your business process, what are two things you can do to eliminate much of the risk of a data breach? Answer: Application-Level Encryption and Stro...
Read more

Disruptive Defenses Are the Key to Preventing Data Breaches

A report from DLA Piper states that more than 160,000 data breach notifications have been reported across 28 nations in the European Union since the General Data Protection Regulation (GDPR) went into...
Read more

Capital One: Chronicle of a Data Breach Foretold

The “data breach of the year” involved more than 100M files containing sensitive information of consumer credit card applications at Capital One. The story hit headlines for months, and with much reas...
Read more

The 4 Ingredients Needed for Securing Data, First

Creating a tight security plan has in the past few years become a concerning aspect of IT for any business, whether established on the scene or just starting up. Traditional security models bring up i...
Read more

The Two Most Important Steps to Keep Your Data Secure

Although we all recognize that keeping our data safe is important and encryption is something we've probably heard about, how many of us really understand what that means? I know I'm learning more eve...
Read more

The Best Data Breach Tactics to Deploy Now

A top-of-mind question for business leaders across all industries is how to eliminate the risk of a data breach. In addition to removing sensitive data from your business process, there are two other ...
Read more