Featured Articles

Cryptographic Key Management Considerations for Secure Cloud Computing

The cloud has gained enormous adoption due to significant cost savings, ease of use, and scalability benefits. When it comes to security, however, using the cloud is comparable to leaving your...
Read More
Featured Articles

Three steps toward stronger data protection

Technology has become more complex. Mobile computing, cloud computing and IoT are adding millions of new devices and users to the internet each year, creating demand for new products, services and...
Read More
News

StrongKey Expands Market Share with Tellaro Line of Data Security Appliances

Company Uniquely Combines Encryption and Strong Authentication to Make Breaches Irrelevant
Read More
Featured Articles

StrongKey Growing Durham Presence Under CEO Jake Kiser

Having half of your employees in Cupertino, Calif., and the other half in Durham might be a nightmare for some companies, but for StrongKey’s CEO Jake Kiser it’s an opportunity.
Read More
Featured Articles

Preparing for Stronger Data Privacy Law Based on GDPR and CCPA

The California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR) may signal a coming global standard for data protection. Why? Business.
Read More
Featured Articles - Nov 15, 2018

Why Mid-Size Businesses Must Have Enterprise-Grade Security

Just because mid-market businesses are smaller doesn’t mean they should act small when it comes to cybersecurity.
Read More
Featured Articles - Nov 15, 2018

Your mid-market business needs encryption and authentication

Mid-sized businesses tend to put most of their security eggs in the network-based solutions basket. These solutions are focused on preventative measures, when zero-day attacks—by definition—take advantage of unknown...
Read More
Featured Articles - Oct 25, 2018

ACT Quickly to Ensure the Safety of Your Data

Keeping a financial services organization’s data safe can seem like mission impossible, but focusing on the application layer will eliminate the vast majority of data breach risks.
Read More
Featured Articles - Oct 16, 2018

ACT Quickly to Ensure Data Security

The dark web maintains a trove of 1.4 billion credentials with unencrypted passwords that are not only accurate, but are stored in a searchable database. LINK TO FULL STORY: ...
Read More
Featured Articles - Oct 12, 2018

Software Procurement Plays Favorites With B2B Investors

Cybersecurity is likely to remain a favorite among B2B investors into the foreseeable future, so it’s no surprise that the industry landed on the board more than once this week.
Read More