July 9, 2014 - Jan Valcke
Jan Valcke

As VASCO celebrates selling its 200 millionth DIGIPASS authenticator, Jan Valcke, President and COO of VASCO, shares his thoughts on the significance of this record setting milestone and what the future holds. In this 3 minute video, Jan provides insights into how VASCO is responding to the latest security threats by developing new solutions to improve identity and access management.    

Read More

Product Security Incident Response

I am happy to announce the launch of VASCO’s product security incident response process. This process stipulates the various steps that VASCO takes from the moment that a third party (typically a customer or researcher) reports a suspected vulnerability in a VASCO product until the moment that the vulnerability is addressed by VASCO, for instance using a product fix. In this blog post I want to focus on the two… Read more


June 18, 2014 - Victoria Abramson
Do Cloud Applications Deliver Convenience or Danger?

Banned. Condemned. Not Allowed. These are some of the phrases used to describe what I consider some very useful cloud applications. As technological advances bring more consumer gadgets into our business environments, we as users begin to lose track of where our personal domain ends and our employer’s begins. It’s convenience that drives adoption of public cloud applications, mobile devices, and mobile apps in the business world. “If it makes… Read more


How to build trustworthy apps... without scaring your users away?

The explosive growth in mobile apps and devices has triggered an increase in mobile security risks. As a consequence, users become more vigilant when deciding which apps to trust and which ones are best left untouched. Whether you build your own applications, or use them to run your day-to-day business, your users demand trustworthy apps! But how do you do that? How can you ensure users trust your apps and… Read more


In order to protect user accounts against unauthorized access by hackers, more and more companies are adding an extra layer of security to their online applications called “two-factor authentication“. Facebook, Google, LinkedIn, Twitter and Tumblr… the list of technology companies deploying two-factor authentication security is growing each day. But how does two-factor authentication really work? Here’s a short movie we made that explains the concept in just 60″. Enjoy!

Read More

effective authentication solution

Implementing an effective authentication solution can only be achieved by finding a true balance between security, user-friendliness and total cost of ownership. When looking for a solution to secure your online application, you will run into conflicting goals. You want the solution to be as secure as possible, but at what cost? And of course, you want your customers to be able to use it on their preferred mobile platforms…. Read more


March 12, 2014 - Giovanni Verhaeghe
apps on mobile phone

Mobile devices and applications are omnipresent in today’s society. Imagine, in 2013 alone, more than 120 billion mobile apps were downloaded. However, people often do not reflect on the security of these applications. Do you adequately protect your personal information? Do you need a password to access the application? Is the PIN used to access the SIM of your phone enough? Is the password you use to access the application,… Read more