Our CEO, Charles Durkin, wrote an article that was featured in October’s edition of Cyber Defense Magazine. Read the original article here or see the copy below. “Creating a new online account is a dreaded task for most internet users. Complexity and security concerns increase user anxiety with each new username and password combination. Despite tremendous advances in technology, the problem with online identity and authentication has been getting worse. The internet’s original design did

Read More

The Password-Free Revolution Has Begun Privakey has announced the latest enhancement to their revolutionary cloud-based authentication service. Online services that subscribe to Privakey can now allow their users to login with a simple tap on their mobile device, or a click of their computer’s mouse. Completely password-free! Among the most dreaded tasks of internet users is the creation of still another username and password combination. Despite tremendous advances in technology, the problem with online authentication

Read More

Privakey has announced the latest enhancement to their revolutionary cloud-based authentication service. Online services that subscribe to Privakey can now allow their users to login with a simple tap on their mobile device, or a click of their mouse. No password needed! Instead of asserting an insecure password, users simply tap the approve button when a push notification is received from the Privakey app. The user’s approval asserts their identity, which is bound to a

Read More

Venture capital experience will benefit the early stage company Privakey, an innovator in cloud-based digital identity and authentication, has appointed Pamela Strisofsky to its Board of Directors. Strisofsky brings more than 25 years of finance, venture capital, and business operations experience to the Privakey Board. Strisofsky currently serves as Chairwoman of Ardica Technologies, and as a member of both the board and the finance committee of the First Hospital Foundation. She also serves as an

Read More

In February this year, one of the biggest cybercrime bank heists to date occurred with the Bank of Bangladesh losing $81 million to hackers.  In a recent Reuters news article, it was noted that fraudulent activity was traced to the Society for Worldwide Interbank Financial Telecommunication (SWIFT) system on the computers of the Bank of Bangledesh. The article noted the following: “SWIFT is aware of a number of recent cyber incidents in which malicious insiders

Read More

According to a recent VentureBeat article, one out of every four websites is powered by WordPress. WordPress is a free open source content management system that makes it easy to deploy and maintain information on the web. Prior to WordPress, online content management was complex, costly, and time consuming. The CMS system has successfully delivered low cost, sophisticated content management to the masses. User authentication is another complex process that must be built into most websites. It has become much more complex and

Read More

Privakey recently released its Chrome application which is now available for free download at the Chrome Web Store. With the authentication service available as a Chrome app, the list of devices ready to use Privakey gets longer. In addition to Privakey’s iOS and Android apps, users utilizing their device’s Chrome web browser will also be able to log into Privakey enabled websites. By enabling cross-platform, desktop access for end-users, Privakey becomes an even more attractive

Read More

WordPress has been added to the long list of data breaches in 2015. Like each of the several preceding years, this past year was the worst on record for data breaches. ITProPortal has reported that on December 10th, 2015 a breach of the popular online publishing platform occurred. Specifically, the WP engine was attacked, forcing WordPress to notify over 30,000 users of a potential compromise. So far the breach has not resulted in any misuse

Read More

There is broad agreement among cyber security experts that the use of shared secrets for authentication presents a very attractive attack vector to cyber criminals. Dark Reading cited a 2013 study conducted by Verizon which stated that weak user credentials are an entry point for hackers in about 76% of data breaches. Experts also agree that adding a second factor to the assertion of user identities significantly strengthens authentication transactions. In addition to a shared secret (e.g., a password or a PIN), second factors can include a device, such as a mobile phone, or a biometric, such as a fingerprint.

Read More