Windows Logon

In light of constantly evolving cybersecurity risks, businesses must take strong measures to secure internal and remote network access by employees. Today’s workforce requires convenient anytime, anywhere access to web, mobile and cloud networks, applications and resources. Clearly, timely access to information drives business forward. At the same time, organizations must prevent security breaches, and maintain continuous compliance with security… Read more


Best Practices for Switching from Hardware to Software Tokens

The smartphone has become indispensable. According to Deloitte’s latest Global Mobile Consumer Trends1 report, a survey of 17 developed countries found that one in five consumers checks their phone >50 times a day. The explosive adoption of mobile apps and devices is changing how banks authenticate customers in the digital world. One trend we expect to continue into 2018 and… Read more


A Shift in the Wind – Securing Patient Portals

I thoroughly enjoyed my time at HIMSS16 in Las Vegas. It was great to be back, see old friends and make new ones. The landscape, as it relates to security has certainly changed since my first HIMSS Conference in 2008. I recall walking the exhibit hall discussing multi-factor authentication and identity management only to receive blank stares or interesting comments from… Read more


Are you part of the 200,000,000 club?

If you’re doing internet-banking, playing online video games or simply logging on to your company’s network, there’s a good chance the answer to this question is “YES” and here’s why. Many of these types of applications require users to login with a VASCO DIGIPASS® authenticator or token. DIGIPASS authenticators come in all shapes, sizes & colors (there are even software… Read more


May 22, 2014 - Marc Pletinckx
Should mobile apps be secured with strong authentication?

The answer is – obviously – YES, especially when you look at the kind of malware and vulnerabilities that are roaming around. When you launch your latest purchased app on your smartphone or tablet for the first time, you are asked to fill in your username and password. There is a big chance that those credentials are then memorized by the… Read more


Trusted identity, the next security solution

Nowadays it is common practice to log on to websites and applications using a username and static password. But have we ever asked ourselves why?  You’d probably reply that the answer is obvious: we want to protect our personal information and credentials from falling into another’s hands. It is something mankind has been doing for thousands of years: to protect… Read more


March 12, 2014 - Jan Valcke
cracking passwords

A while ago, Ars Technica, a US magazine, had a rather eye-opening experience. A list of 16,000 encrypted passwords was given to Nate Anderson, the publication’s Editor-in-Chief, then to three cracking experts. After a few hours’ work, Nate Anderson, though a newcomer to the field, managed to decipher nearly half of the 16,000 passwords. The three seasoned crackers between them… Read more