Warning: Cannot modify header information - headers already sent by (output started at /nfs/c02/h09/mnt/39307/domains/verayo.com/html/blog/index.php:166) in /nfs/c02/h09/mnt/39307/domains/verayo.com/html/blog/wp-includes/feed-rss2.php on line 8
Verayo Blog http://verayo.com/blog Just another WordPress site Wed, 04 Jun 2014 21:23:25 +0000 en-US hourly 1 http://wordpress.org/?v=3.7.25 Combining hardware and software to make security real secure http://verayo.com/blog/?p=180 http://verayo.com/blog/?p=180#comments Wed, 04 Jun 2014 21:21:53 +0000 http://verayo.com/blog/?p=180 Continue reading ]]> Software and Hardware

Software is very important to build security solutions, but alone is not enough. Software is breakable, some solutions are stronger than others, but still hackable. At Verayo, we believe a combination of hardware and software is the answer for enhanced security. With our SiliconIDTM technology, we created a small hardware seed that allows us to deploy differentiated SaaS security solutions.

What is distinctive about our hardware seed is its uniqueness.  Our modules are unclonable, built upon our patented Physical Unclonable Function (PUF), nobody can copy or imitate the identity of the silicon. And they are so small that can be embedded almost anywhere – any type of sensors, processors, mobile devices, wearables, personal computers and home appliances.

In addition, we have built SaaS solutions to leverage the singularity of our modules and provide authentication solutions for products, people and machines. Our complete set of APIs enables programming in any platform. We know integration is critical to create effective security solutions. If you want to learn more, let us know at contact@verayo.com.


http://verayo.com/blog/?feed=rss2&p=180 0
What are you doing to protect your digital identity? http://verayo.com/blog/?p=146 http://verayo.com/blog/?p=146#comments Fri, 14 Feb 2014 17:30:10 +0000 http://verayo.com/blog/?p=146 Continue reading ]]> Three facts about internet security


According to the 2013 Microsoft Computing Safety Index (MCSI), recently released and based on more than 10,000 consumers who self-reported their online behavior, two thirds of people are not taking good care of their own digital security.

People tend to have built-in protection turned on, but they don’t seem to be taking any extra steps. This is worrisome if you think about how much personal information we routinely access online.

See below three frightening facts and some simple tips to stay safe online:

Fact 1: Only 1 out of 3 people secure their mobile device with a PIN or password

Tips:  Securing your electronic devices creates an additional step that can be inconvenient, but protects you from malicious intentions.  If you haven’t yet:

__ Set up a PIN or password to securely unlock your mobile devices and save you from trouble if you lose them.

__ Create unique PINs and passwords by combining different types of characters (capital and lowercase letters, numbers and symbols) and avoiding easy sequences (that others can figure out).

Fact 2: Only 1 out of 3 people use secured wireless networks.

Tips: Mobile is how we live today. Using remote access and public networks to stay connected is part of our life. This is ok if you take measures to stay protected.

If you haven’t secured your trusted networks (home or office):

__ Restrict any access to it, right away. Creating a password is the first step.

If you use public networks (coffee shops, airports, etc.):

__ Secure your electronic devices using second factor authentication. To learn more about our authentication solutions, visit www.verayo.com.

__ Take advantage of web browsing filters to protect you against phishing.

__ Do not access financial or sensitive sites from public networks to avoid exposing important personal information.

Fact 3: Only 1 out of 3 people educate themselves about the most current ways to protect against identity theft.

Tips: On a day-to-day basis, we expose our digital identity by accessing accounts, making transactions, uploading/downloading files, etc., without taking secure measures. Some are very simple and easy to implement:

__ Do not respond to any online request to verify your social security, account number or password unless you made the contact.

__ Be private on social networks.

__ Enter personal information and click with caution.

__ Check your statements and credit report periodically.

All of the tips mentioned above are helpful to protect your digital identity. Take a holistic approach and be proactive. You never know when or where it can happen to you. It’s always better to be prepared. Most technology companies are working hard to secure your information, but you are responsible for being proactive and taking measures to protect your own digital assets.


http://verayo.com/blog/?feed=rss2&p=146 0
Convenient authentication provides you with more security http://verayo.com/blog/?p=122 http://verayo.com/blog/?p=122#comments Mon, 03 Feb 2014 08:00:13 +0000 http://verayo.com/blog/?p=122 Continue reading ]]>  

Opal by Verayo - Simply Secure

Digital authentication should be convenient. No doubt. We should be able to enjoy our interconnected digital world without wasting our time with complicated authentication steps (passwords, passcodes, security questions…) It sounds obvious, but existing solutions seem to forget this common desire. They seem to believe that the more complicated, the more secure.

But the truth is the “more complicated”, the more incentives we (users) find to create shortcuts, and consequently, the “less secure”.

Have you heard anything about the password dilemma? When passwords first appeared in our lives, they worked just fine, not a big deal: a keyword you need to remember to prove who you are. First thing that came to your mind. No big requirements.

Nowadays, it’s a different story. The more digital accounts we have, the more passwords we need to remember. And for security reasons, we are required to create very complicated passwords (combination of capital letters, numbers, symbols, etc.) But we need to keep living our lives. We need to save room in our brains for other very important activities that take place in life. That’s why we (users) create shortcuts: pet’s name, middle name, sequence of numbers… we also write them down and use a few passwords for multiple accounts. But, guess what? That makes passwords, and consequently the authentication process, “less secure”.

Yet, let’s be honest. Most of us live our lives ignoring how exposed we are. We blindly rely on passwords. We don’t think about it. We might think it’s not important. But, it is. Our digital identity is at risk.

At this point, I hope, we all agree on how important authentication is and why it should be seamless. The “more convenient” it is, the more likely we will use it properly, and the “more secure” our digital life will be. This is why Verayo has created Opal. Simply secure. Learn more at www.verayo.com.


http://verayo.com/blog/?feed=rss2&p=122 0
If you are using passwords, stay on the safe side! http://verayo.com/blog/?p=128 http://verayo.com/blog/?p=128#comments Mon, 27 Jan 2014 23:23:58 +0000 http://verayo.com/blog/?p=128 Continue reading ]]> Risky Passwords

You might not think about your passwords all the time, how strong they are. And probably, you haven’t experienced any hacking before, so you feel secure. But you are certainly at risk when relying only on passwords to access your digital accounts.

This is particularly true if you use ‘easy to remember’ passwords. If you do, you are not alone, but that only makes you more vulnerable.

Over the years, multiple lists have been posted online with passwords stolen in data breaches. It has been demonstrated that millions of people use weak passwords, such as: ‘123456’, ‘password’, ‘111111’, etc.  Let’s be honest, these passwords are not only ‘easy to remember’, they are also ‘easy to hack’.

Isn’t this scary? Yes, it is. Anybody can figure them out. More importantly, many hackers are out there trying to figure them out.

If you are using one of these risky passwords, please change it immediately. But also, look for a second layer of authentication. Passwords are not enough.  Verayo provides you with convenient and secure authentication solutions.  Learn more at www.verayo.com.


http://verayo.com/blog/?feed=rss2&p=128 0
Wearable technology, what’s next? http://verayo.com/blog/?p=113 http://verayo.com/blog/?p=113#comments Mon, 20 Jan 2014 18:50:10 +0000 http://verayo.com/blog/?p=113 Continue reading ]]> Wearable Technology

So far, I haven’t seen any wearable electronic device that I would like to wear – chunky wristbands, masculine watches and space glasses are not what I’m looking for. I want something that looks nice, but is also functional.

Most of the existing wearable gadgets are limited to certain functions – activity tracking, body sign measurement, phone notifications and video/pictures. Each device in the market, at least in the future market, seems to be addressing only one or a few of these features at a time. But to make me wear one (because I only have one body), I need more (and meaningful) features.

The next big thing should be a nice-looking device that also offers an integrated computing solution.  Furthermore, functions not currently offered by my smartphone. What would be the point of duplicating features? I already carry my phone everywhere. What would make me carry something else?

Authentication. We all need to prove who we are all the time to securely access our countless number of digital accounts. What if authentication was offered frictionless in a wearable device? Good news is, Verayo has developed a very secure and convenient authentication technology that can be easily integrated to (or embedded in) almost any device… want to learn more?  Ask us at contact@verayo.com.

http://verayo.com/blog/?feed=rss2&p=113 0
Welcome to my crypto corner of the world! http://verayo.com/blog/?p=104 http://verayo.com/blog/?p=104#comments Wed, 27 Nov 2013 01:31:48 +0000 http://verayo.com/blog/?p=104 Continue reading ]]> David B:W

This is an exciting time for Verayo. After being in stealth mode for many moons, not being able to disclose any of our recent developments and innovation in PUF technologies, at last, our new web site (I hope you like it) is live and all communication channels open!

Surprisingly enough, our marketing gurus have even encouraged me to start a column dedicated to cryptology and security… with the caveat that I should relate my stories, whenever possible, to our company products and technology portfolio. Fair enough, freedom is rarely absolute and at least, I am not required to say that our products are fantastic (they are) and our solution the (very) best available to tackle authentication issues in a variety of use cases, across most verticals.

I will try to post on a regular basis (though you all know how unreliable (crypto)boys can be) about my favorite topics, but also invite experts to either post an interesting story, play a crypto Q&A game with me, or simply comment on a key event (NSA position on privacy issues anyone?) happening in our (in)secure world.

Stay tuned, CryptoBoy is watching you !!

http://verayo.com/blog/?feed=rss2&p=104 0
Risks of not securing our digital life http://verayo.com/blog/?p=79 http://verayo.com/blog/?p=79#comments Sat, 16 Nov 2013 02:03:38 +0000 http://verayo.com/blog/?p=79 Continue reading ]]> Risky Password

Passwords, PINs, mother’s maiden name, pets’ names, and your first car.  What do all of these things have in common?  They give us the feeling that we are protecting our online identities.  Notice that I wrote feeling, because things that can be linked to us can be used against us. 

Now be honest – we’ve all found a password that we like, and used it everywhere.  Email, social media, online banking – everywhere, and hoped that no account would be hacked. Actually, some studies showed that people have in average 3 different passwords, most of time very close to each other, that they use on more than 25 different online accounts.

Sometimes we are lucky and sometimes not. We all know someone whose email was hacked, and that “person” sent emails out to everyone saying that they were stuck in China and needed money to get home.  Very often, you see the Twitter account of your friend posting weird topics – yes, it has been hacked. This happens all the time. Or maybe that they were in jail and needed money for bail, and all that you as a dutiful friend need to do, is to wire them money ASAP!  This, however, certainly isn’t the worst thing that can happen.  What if someone hacks your bank account and siphons off your life savings?  Do you want to be the person who is hacked?  Absolutely not! For example, information were stolen on Citigroup’s servers 3 times over the last 6 years, including Social Security Number and other valuable information.

If you are reading this blog, then you are aware of the risks and endeavor to secure your online identity.  But, it is a real challenge.  Unique passwords for all sites you visit and keeping straight which password goes with which site.  I’m sure that you don’t have a cheat-sheet with your passwords written down!  And honestly, I hope not… Then, there’s two-factor authentication for the sites that offer it.

What if there was a way to easily secure your digital ID? I’m pretty sure you would be interested in such a solution…

http://verayo.com/blog/?feed=rss2&p=79 0
Bring-your-own-device (BYOD) policies come with their share of risks http://verayo.com/blog/?p=69 http://verayo.com/blog/?p=69#comments Mon, 11 Nov 2013 02:34:23 +0000 http://squiberismyhomie.com/websites/verayo/www/blog/?p=69 Continue reading ]]>

Nowadays, in this world where real-time connectivity and ability to get access to any information from anywhere, companies cannot do without letting their employees use internet-connected mobile devices. In that sense, more and more companies are allowing employees to work using their personal devices also-known-as BYOD policies.

According to Forrester, more than 53% of workers worldwide are allowed to do so. And this trend is even stronger in high-growth markets (Brazil, China…) as companies can’t keep up with their needs for real-time connectivity.

One could think it is particularly appealing to employees. But do you really think that companies would agree for such a big change if they couldn’t get their part of value? For example, Intel decided to allow their 107,000 employees to use their own devices. This comes with a boost of employee efficiency (57min of additional time to work per day) as they are supposed to be connected at all times, and some clear IT savings ($1,650 per worker per year) as companies don’t need to spend money to equip their employees.

Meanwhile, it would be too perfect if this doesn’t come with their share of risks. Indeed, company data is more difficult to control. By using a non company-controlled device, employees are putting company data at risk. Unsecured wireless network, weak passwords and cookies, vulnerable personal software/applications and obviously stolen or lost devices are a real fear for companies. And they need solutions to mitigate those risks.

Companies can still force their employees to use security solutions such as private/professional personas or mobile SSL/VPN to limit these risks but nobody can do anything against stolen devices if employees don’t realize fast enough their mobile devices are missing. Remotely wipe devices is possible, but it requires employees to declare their device is lost.

Verayo token to secure access to your mobile devices

At Verayo, we believe we can provide employers and employees with the perfect additional layer of security, which is at the same time very strong and convenient. Our token can solve the issue of stolen devices and replace weak passcodes and other patterns used to unlock your devices are weak. This brings real peace of mind.

If you want to learn more about our solutions and technology, visit our website www.verayo.com or contact us at contact@verayo.com.

http://verayo.com/blog/?feed=rss2&p=69 0
Wearable devices have come to stay, but that market needs a shake! http://verayo.com/blog/?p=53 http://verayo.com/blog/?p=53#comments Sat, 09 Nov 2013 02:17:52 +0000 http://squiberismyhomie.com/websites/verayo/www/blog/?p=53 Continue reading ]]>  

Verayo wearable

Personal ornaments have always been present in our lives… earrings, necklaces, bracelets, and watches. We, human beings, have always worn our jewelry proudly. They are valuable. They enhance us. They help us express who we are. Their design, uniqueness, and functionality are part of the decision for which one we use.

Over time, jewelry has evolved. Even technology gadgets have become part of the broad selection. Yes, you heard right, electronics. Smart watches and activity trackers you can wear on you wrist or even pin on your clothes. The list of brands entering into this market keeps growing every day, maybe too much. Users can’t keep up with it. And any new wearable competes with the traditional ones; those we carry just for fashion. It’s a hard decision, what should I carry with me today?

Not all the time it is about appearance, though. Functionality is a big deal, too. We are limited in the number of pieces we can wear at a time, so wearables need to have a purpose, and a good one! They need to be worth the valuable space we assign to them in our lives.

If the wearable market doesn’t provide integrated solutions (devices with multiple and relevant functions), users will be forced to choose. In that case, the question is… what is truly relevant for them? At Verayo, we know that security is for sure part of that list. That’s why we have developed our SiliconIDTM technology. This patented technology is so easy to integrate to other devices that we could actually provide a security solution for almost any wearables in the world.

http://verayo.com/blog/?feed=rss2&p=53 0
Welcome to Verayo Blog http://verayo.com/blog/?p=47 http://verayo.com/blog/?p=47#comments Sat, 09 Nov 2013 00:57:21 +0000 http://squiberismyhomie.com/websites/verayo/www/blog/?p=47 Continue reading ]]> Verayo will keep you updated on new trends and events for a wide range of topics in the mobile world business.

We will cover new trends such as wearables, BYOD, authentication solutions… and also give you some more technical articles written by our in-house CTO aka Cryptoboy.

Stay tuned. You don’t want to miss anything!!

http://verayo.com/blog/?feed=rss2&p=47 0