July 9, 2014 - Jan Valcke
Jan Valcke

As VASCO celebrates selling its 200 millionth DIGIPASS authenticator, Jan Valcke, President and COO of VASCO, shares his thoughts on the significance of this record setting milestone and what the future holds. In this 3 minute video, Jan provides insights into how VASCO is responding to the latest security threats by developing new solutions to improve identity and access management…. Read more

Read More

Product Security Incident Response

I am happy to announce the launch of VASCO’s product security incident response process. This process stipulates the various steps that VASCO takes from the moment that a third party (typically a customer or researcher) reports a suspected vulnerability in a VASCO product until the moment that the vulnerability is addressed by VASCO, for instance using a product fix. In… Read more

June 18, 2014 - John Gunn
Do Cloud Applications Deliver Convenience or Danger?

Banned. Condemned. Not Allowed. These are some of the phrases used to describe what I consider some very useful cloud applications. As technological advances bring more consumer gadgets into our business environments, we as users begin to lose track of where our personal domain ends and our employer’s begins. It’s convenience that drives adoption of public cloud applications, mobile devices,… Read more

How to build trustworthy apps... without scaring your users away?

The explosive growth in mobile apps and devices has triggered an increase in mobile security risks. As a consequence, users become more vigilant when deciding which apps to trust and which ones are best left untouched. Whether you build your own applications, or use them to run your day-to-day business, your users demand trustworthy apps! But how do you do… Read more

In order to protect user accounts against unauthorized access by hackers, more and more companies are adding an extra layer of security to their online applications called “two-factor authentication“. Facebook, Google, LinkedIn, Twitter and Tumblr… the list of technology companies deploying two-factor authentication security is growing each day. But how does two-factor authentication really work? Here’s a short movie we… Read more

Read More

effective authentication solution

Implementing an effective authentication solution can only be achieved by finding a true balance between security, user-friendliness and total cost of ownership. When looking for a solution to secure your online application, you will run into conflicting goals. You want the solution to be as secure as possible, but at what cost? And of course, you want your customers to… Read more

March 12, 2014 - Giovanni Verhaeghe
apps on mobile phone

Mobile devices and applications are omnipresent in today’s society. Imagine, in 2013 alone, more than 120 billion mobile apps were downloaded. However, people often do not reflect on the security of these applications. Do you adequately protect your personal information? Do you need a password to access the application? Is the PIN used to access the SIM of your phone… Read more