BSSN Common Criteria Compliance for Stronger Security Indonesia’s digital economy is expanding rapidly, with financial services, telecoms, and government agencies increasingly reliant on secure digital platforms. To…
Securing Banking Through APRA Compliance with V-Key In Australia’s financial services sector, regulatory compliance is inseparable from trust and resilience. The Australian Prudential Regulation Authority (APRA) plays…
V-Key at COBA 2025: Strengthening Digital Identity and Compliance in Australia AUGUST, 2025 — The COBA 2025 Conference once again proved to be the premier gathering for Australia’s customer-owned banking sector.…
Shield in Minutes and Keep Your Mobile App Fast and Secure Mobile apps have become the primary gateway for users to browse, purchase, book, track, earn rewards, and engage in real…
Modern Authentication in ANZ: Finding the Balance Between Security and User Experience In Australia and New Zealand, authentication has reached a turning point. Banking apps, telco platforms, superannuation portals, and digital health…
How to Choose the Right Authenticator Authentication is essential for ensuring that only authorized individuals gain access while keeping unauthorized users out.
Navigating Business, Technology and Trust: V-Key at AIBP Malaysia 2025 The AIBP Conference & Exhibition 2025 in Kuala Lumpur brought together decision-makers from across the financial services, enterprise, and technology…
V-Key Expands to Japan, Enhancing Mobile App and Digital Identity Security 2025 June — V-Key is expanding into Japan, bringing trusted digital identity and mobile app protection to one of the…
Built for RMiT, Securing Malaysia’s Financial Future with V-Key More than just a requirement, compliance is what helps businesses stay strong and keep customer trust intact. This is especially…
How V-Key ID Enhances Banking Security In Australia’s highly regulated financial environment, robust digital identity and authentication controls aren’t just best practice, they’re a compliance imperative.…
Why Developers Shouldn’t Have to Choose Between Speed and Security Mobile development moves fast. There are always new features to launch, bugs to fix, and deadlines to meet—and developers are…
The Real Cost of Mobile App Breaches and How to Stay Ahead of Threats Mobile apps have become the primary engagement channel for modern businesses. Whether it’s a healthcare portal, an e-commerce platform, a…
The Fake SMS That Looks Real Why Indonesia needs to talk about digital trust—now. It usually begins with a simple SMS. You’re going about your day,…
Building Digital Trust with V-Key at the State Bank of Vietnam Event 2025 April, Vietnam – V-Key had the privilege of participating in the State Bank of Vietnam (SBV) CIO Roundtable event…
Journey to Passwordless Authentication Is it the Beginning of the End of Passwords? In the wake of cyber-attacks at some of the biggest Superannuation…
Vietnam’s New Digital Security Regulations: Strengthening Mobile and Biometric Protections Vietnam is rapidly enhancing its digital security landscape. In just the past six months, two major regulations—Decision 2345 (effective July…
Mobile Malware Landscape in 2024: Why App Security Is Critical for Businesses Mobile malware attacks are rising as mobile banking, digital payments, and remote authentication become mainstream. In 2024, over 33.3 million…
Strengthening Australia’s Digital Identity Future Australia is making significant progress in digital identity adoption, with the federal government leading efforts through its national Digital ID…
Beyond OTPs: The Shift to Passwordless Authentication in Banking The Bangko Sentral ng Pilipinas (BSP) is considering phasing out one-time passwords (OTPs) for digital banking transactions, citing the growing…
V-Key Continues to Expand in Australia to Strengthen Digital Identity and Authentication V-Key strengthens its presence in Australia by participating in the FIDO Alliance events in Melbourne, reinforcing its commitment to digital…
Why Passwordless Authentication is the Future of Security Managing passwords can be challenging. They can be difficult to remember, and often, people reuse them across multiple sites, which…
Protect Your Business All Year with V-Key ID and FIDO2 Lunar New Year is a time for celebration for many people around the world, but it’s also a good opportunity…
V-Key’s 2024 Journey in Advancing Digital Security and Empowering Seamless Digital Experiences As we reflect on 2024, V-Key is proud of the milestones we’ve achieved and the innovations we’ve introduced in the…
5 Simple and Effective Ways to Secure Your Mobile App with V-OS App Shield For businesses, especially those handling sensitive data or financial transactions, ensuring app security is no longer optional. The risk is…
Securing Mobile Apps and Why It’s Critical for Businesses Mobile devices continue to become indispensable, with the average smartphone user spending around 88% of their day interacting with apps.…
Introducing V-OS App Shield: Connect, Deploy and Protect your App in Minutes Mobile applications are key to daily business operations, customer engagement, and overall functionality. According to Google, the average smartphone user…
V-Key partners with Bridge Alliance to build a Safer Digital Ecosystem V-Key, renowned for its advanced security solutions has proudly joined Bridge Alliance as their technology Partner, solidifying their commitment to…
Making 2FA/MFA robust against smishing and related attacks 2FA/MFA was introduced to make it harder for attackers, by requiring two or more proofs of identity – also known…
How do we determine the effectiveness of mobile apps’ security systems? With the spate of remote working regime due to Coronavirus pandemic, the reliance and growth for video conferencing platform has…
Is the detection of jailbroken/rooted phone sufficient against threats? Functions that detect jailbroken/rooted devices are most commonly added to transactional mobile applications, serving as the most basic defense against…
Three steps to fight the Mobile Security status quo Have financial institutions accepted a status quo that sacrifices user experience for increased security? With mobile digital identity quickly becoming…
V-OS Protection against Android Plugin malware There has been a recent surge in Android malware abusing Android Plugin Frameworks for malicious behavior. DroidPlugin, Parallel Space and…
V-OS Protection against CPU vulnerabilities Virtually every computing device in the world is made unsafe by the latest disclosures on Central Processing Unit (CPU) vulnerabilities.…
The next wave of Finance: Singapore’s growing Fintech market With global cumulative investment in financial technology (fintech) forecast to exceed US$150 billion in three to five years, economies around…
Infographic: The next frontier in Banking transformation As technology evolves, banks and financial institutions have no choice but to innovate. However, when it comes to security, many…
Is software-based Biometrics Authentication the solution to ASEAN’s regulatory challenges? Banks in Southeast Asia should look towards software-based biometrics as the way forward to navigate the regulatory differences in the…
How does a Virtual Smart card protect a customer if they lose or change their mobile phone? From banks to government agencies, many organisations are intrigued by and exploring software security solutions such as mobile tokens and…
Building V-OS with HSM V-OS is the world’s first virtual secure element, a software solution with security built into the firmware code. These include…
Cryptography in V-OS V-OS is the world’s first virtual secure element. Cryptography plays a dual-role in these; to secure and manage the secrets…
Why Existing Mobile Software Protections are Insufficient Recognizing that existing mobile software protections are insufficient against today’s cyber threat landscape, we take a closer look at the main…