In the Age of FIDO, Does SSO Matter?

Preface: A question was raised on a FIDO forum recently on what "best practices" exist for integrating 0Auth2 with FIDO2 to enable Single Sign-On (SSO) to applications. While the poster was seeking a ...
Read more

FIDO 101: Understanding FIDO Strong Authentication and What It Can Do for You

If you'd like to dive deeper into the world of FIDO, we recommend reading our FIDO 201 article, our in-depth guide to FIDO Protocols, and our Evaluation of SCA Methods for PSD2. What Is FIDO? FIDO is ...
Read more

Physical Security for PCI DSS

In cybersecurity we often focus on preventative measures inside the electronics and software we use. Of utmost importance are the procedures surrounding the physical infrastructure: initial deployment...
Read more

An In-depth Guide to FIDO Protocols: U2F, UAF, and WebAuthn (FIDO2)

To learn more about the Alliance, read our FIDO 101 article. Read our FIDO 201 article to learn how FIDO2-based authentication can be deployed using StrongKey's PKI2FIDO web application, and move beyo...
Read more

How to Defeat Ransomware in 4 Easy Steps

With these 4 (somewhat) easy steps, even if your data is ransomed, recovery will become a matter of days rather than months, your recovery costs will drop drastically—and, bonus, customer opinion won'...
Read more

Protecting Connectivity in a 3D-Printed World

The world of industrial manufacturing is finally stepping into the future by capitalizing on the innovations of the 3D-printing revolution. The resulting field of this technological marriage between t...
Read more

Mitigating Data Breaches with ALESA

Question: Aside from eliminating sensitive data from your business process, what are two things you can do to eliminate much of the risk of a data breach? Answer: Application-Level Encryption and Stro...
Read more

Disruptive Defenses Are the Key to Preventing Data Breaches

A report from DLA Piper states that more than 160,000 data breach notifications have been reported across 28 nations in the European Union since the General Data Protection Regulation (GDPR) went into...
Read more

Capital One: Chronicle of a Data Breach Foretold

The “data breach of the year” involved more than 100M files containing sensitive information of consumer credit card applications at Capital One. The story hit headlines for months, and with much reas...
Read more

The 4 Ingredients Needed for Securing Data, First

Creating a tight security plan has in the past few years become a concerning aspect of IT for any business, whether established on the scene or just starting up. Traditional security models bring up i...
Read more