Featured Articles

StrongKey, Others Back NIST Retail Fraud Guide To Improving Mobile Payments Security

The NIST report, Special Publication 1800-17, titled “Multifactor Authentication for E-Commerce”, offers insight on how companies that want to put more security in place at their point of sale and...
Read More
Featured Articles

Biometrics Brings Us One Step Closer to Eliminating Passwords for Good

What will drive the end of the password era? The biggest driver will be the potential for breach and the expenses associated with it — not just the financial costs, but the reputation damage that...
Read More
Featured Articles

Caring for the Whole Patient – Including Their Data

Digital transformation has brought about unprecedented opportunities for the healthcare industry, along with unforeseen pitfalls. Healthcare providers subscribe to the notion of “duty of care,”...
Read More
Featured Articles

Duty of Care and Information Security

The Hippocratic oath and the principles embodied in “duty of care” guide the daily actions of healthcare providers. But when it comes to information security and protecting sensitive PHI, is the...
Read More
Featured Articles

Why Software Remains Insecure—and Why It Really Shouldn’t

In a recent blog post, Daniel Meissler theorizes that the benefits of quickly building bad software have so far outweighed the downsides. Though this sounds plausible and seductive, there is a...
Read More
Featured Articles - Feb 26, 2019

Android Addition Opens FIDO Password Killer to Billions

The FIDO Alliance has gained support from another tech giant, getting one step closer to solving the world's password problem.
Read More
Featured Articles - Feb 22, 2019

For Secure Cloud Computing, Get Control of Your Crypto Keys

The poor state of cloud security must remain top of mind for organizations invested in the cloud or migrating to it. LINK TO FULL STORY: ...
Read More
Featured Articles - Feb 20, 2019

The Two Network Security Tools Your Mid-Sized Business Needs

Encryption and authentication — let's learn more about why your company needs these security tools. LINK TO FULL STORY: https://dzone.com/articles/the-two-network-security-tools-your-mid-sized-busi
Read More
Featured Articles - Feb 19, 2019

DevSecOps Begins at the Application Layer

In the fast-moving world of DevOps, security sometimes got left by the wayside on the way to the next iteration. But today's threat landscape is so perilous that developers need to have solid security top of mind as they...
Read More
Featured Articles - Feb 18, 2019

HIMSS19 Highlight with Arshad Noor, CTO of StrongKey

Roberta Mullin talks to Arshad Noor, CTO of StrongKey. He talks about his presentation on "Duty of Care and Information Security"
Read More