<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 21, 2026 at 7:03 am by All in One SEO v4.9.0 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.v-key.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>V-Key</title>
		<link><![CDATA[https://www.v-key.com]]></link>
		<description><![CDATA[V-Key]]></description>
		<lastBuildDate><![CDATA[Wed, 20 May 2026 09:56:22 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.v-key.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.v-key.com/resource/app-protection-vs-app-shield/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/app-protection-vs-app-shield/]]></link>
			<title>V-OS App Shield vs. V-OS Mobile App Protection: Choosing the Right Solution for Your Mobile App</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:56:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/trustsimplified-explainer-video-series/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/trustsimplified-explainer-video-series/]]></link>
			<title>#Trust Simplified Explainer Video Series</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:55:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-os-trusted-identity-services/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-os-trusted-identity-services/]]></link>
			<title>V-OS Trusted Identity Services</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:55:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-secures-uob-mighty/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-secures-uob-mighty/]]></link>
			<title>V-Key secures UOB Mighty</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:55:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/tonik-bank/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/tonik-bank/]]></link>
			<title>Transforming Digital Banking in the Philippines</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:54:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/enabling-asias-first-fully-digital-bank/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/enabling-asias-first-fully-digital-bank/]]></link>
			<title>Enabling Asia’s First Fully Digital Bank</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:54:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/what-digital-wallets-need-to-consider-regarding-authentication/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/what-digital-wallets-need-to-consider-regarding-authentication/]]></link>
			<title>What Digital Wallets Need to consider Regarding Authentication</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:53:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/app-protection-guide/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/app-protection-guide/]]></link>
			<title>App Protection Guide</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:53:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/application-hooking/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/application-hooking/]]></link>
			<title>Application Hooking</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:52:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/how-to-survive-a-hacking-attack/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/how-to-survive-a-hacking-attack/]]></link>
			<title>How to survive a hacking attack?</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:52:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-announcement-v-key-technology-whitepaper-released/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-announcement-v-key-technology-whitepaper-released/]]></link>
			<title>V-Key Technology Whitepaper</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:51:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/most-mobile-authentication-apps-can-be-breached-even-if-hardware-security-is-used/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/most-mobile-authentication-apps-can-be-breached-even-if-hardware-security-is-used/]]></link>
			<title>Most Mobile Authentication Apps Can be Breached, Even if Hardware Security is Used</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:50:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/sim-swap-fraud/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/sim-swap-fraud/]]></link>
			<title>Sim Swap Fraud</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:50:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-rasp-whitepaper/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-rasp-whitepaper/]]></link>
			<title>V-Key RASP whitepaper</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:49:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/biometric-authentication-solutions/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/biometric-authentication-solutions/]]></link>
			<title>Biometric Authentication Solutions</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:49:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/sms-otp-phase-out/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/sms-otp-phase-out/]]></link>
			<title>Redefining Authentication with the Shift from SMS OTPs to Advanced Solutions</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:49:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/enterprise-mobile-security-solution-with-v-key/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/enterprise-mobile-security-solution-with-v-key/]]></link>
			<title>Enterprise Mobile Security Solution with V-Key</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:48:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-id-secure-seamless-digital-identity-solution/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-id-secure-seamless-digital-identity-solution/]]></link>
			<title>V-Key ID: Secure, Seamless Digital Identity Solution</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:48:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/mobile-banking-app-security-is-more-crucial/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/mobile-banking-app-security-is-more-crucial/]]></link>
			<title>Mobile Banking App Security Is More Crucial</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:48:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/kyc-solutions-for-mobile-apps-secure-verification/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/kyc-solutions-for-mobile-apps-secure-verification/]]></link>
			<title>KYC Solutions for Mobile Apps: Secure Verification</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:47:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-keysoftware-based-digital-security-company/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-keysoftware-based-digital-security-company/]]></link>
			<title>V-Key:Software-based Digital Security Company</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:47:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-keeps-your-data-safe-with-soc-2-certification/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-keeps-your-data-safe-with-soc-2-certification/]]></link>
			<title>V-Key Keeps your Data Safe with SOC 2 Certification</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:46:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-launches-digital-trust-platform-to-enable-secure-cloud-based-digital-solutions-and-services-across-industries/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-launches-digital-trust-platform-to-enable-secure-cloud-based-digital-solutions-and-services-across-industries/]]></link>
			<title>V-Key Launches Digital Trust Platform to Enable Secure Cloud-Based Digital Solutions and Services Across Industries</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:46:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-listed-as-sample-vendor-in-2021-gartner-hype-cycle-for-identity-and-access-management/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-listed-as-sample-vendor-in-2021-gartner-hype-cycle-for-identity-and-access-management/]]></link>
			<title>V-Key Listed as Sample Vendor in 2021 Gartner Hype Cycle for Identity and Access Management</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:45:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-support-huaweis-harmonyos-next/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-support-huaweis-harmonyos-next/]]></link>
			<title>V-Key Expands Support to Huawei&#8217;s HarmonyOS NEXT for Enhanced Mobile Security</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:45:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-and-scytales-enter-strategic-partnership/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-and-scytales-enter-strategic-partnership/]]></link>
			<title>V-Key and Scytáles Enter Strategic Partnership</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:44:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-featured-in-enterprise-singapores-quality-trust-playbook/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-featured-in-enterprise-singapores-quality-trust-playbook/]]></link>
			<title>V-Key Featured in Enterprise Singapore’s Quality &#038; Trust Playbook</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:44:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-id-trusted-digital-identity-solution-for-secure-access-across-all-platforms/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-id-trusted-digital-identity-solution-for-secure-access-across-all-platforms/]]></link>
			<title>V-Key ID: Trusted Digital Identity Solution for Secure Access Across All Platforms</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:43:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-extends-idaas-offerings-in-apac-with-ingram-micro-cloud-agreement/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-extends-idaas-offerings-in-apac-with-ingram-micro-cloud-agreement/]]></link>
			<title>V-Key extends IDaaS offerings in APAC with Ingram Micro Cloud Agreement</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:43:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/the-fake-sms-that-looks-real/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/the-fake-sms-that-looks-real/]]></link>
			<title>The Fake SMS That Looks Real</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:43:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/rmit-mobile-security-malaysia/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/rmit-mobile-security-malaysia/]]></link>
			<title>Built for RMiT, Securing Malaysia’s Financial Future with V-Key</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:42:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-continues-to-expand-in-australia-to-strengthen-digital-identity-and-authentication/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-continues-to-expand-in-australia-to-strengthen-digital-identity-and-authentication/]]></link>
			<title>V-Key Continues to Expand in Australia to Strengthen Digital Identity and Authentication</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:42:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/making-2fa-mfa-robust-against-smishing-and-related-attacks/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/making-2fa-mfa-robust-against-smishing-and-related-attacks/]]></link>
			<title>Making 2FA/MFA robust against smishing and related attacks</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:42:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/is-software-based-biometrics-authentication-the-solution-to-aseans-regulatory-challenges/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/is-software-based-biometrics-authentication-the-solution-to-aseans-regulatory-challenges/]]></link>
			<title>Is software-based Biometrics Authentication the solution to ASEAN’s regulatory challenges?</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:41:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/how-v-key-id-enhances-banking-security/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/how-v-key-id-enhances-banking-security/]]></link>
			<title>How V-Key ID Enhances Banking Security</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:41:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/how-do-we-determine-the-effectiveness-of-mobile-apps-security-systems/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/how-do-we-determine-the-effectiveness-of-mobile-apps-security-systems/]]></link>
			<title>How do we determine the effectiveness of mobile apps’ security systems?</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:40:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/the-next-wave-of-finance-singapores-growing-fintech-market/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/the-next-wave-of-finance-singapores-growing-fintech-market/]]></link>
			<title>The next wave of Finance: Singapore’s growing Fintech market</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:40:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/app-shield-launch/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/app-shield-launch/]]></link>
			<title>Introducing V-OS App Shield: Connect, Deploy and Protect your App in Minutes</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:39:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/building-digital-trust-vietnam-banking-security/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/building-digital-trust-vietnam-banking-security/]]></link>
			<title>Building Digital Trust with V-Key at the State Bank of Vietnam Event </title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:39:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/how-does-a-virtual-smart-card-protect-a-customer-if-they-lose-or-change-their-mobile-phone/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/how-does-a-virtual-smart-card-protect-a-customer-if-they-lose-or-change-their-mobile-phone/]]></link>
			<title>How does a Virtual Smart card protect a customer if they lose or change their mobile phone?</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:39:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-os-protection-against-android-plugin-malware/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-os-protection-against-android-plugin-malware/]]></link>
			<title>V-OS Protection against Android Plugin malware</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:38:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/5-simple-and-effective-ways-to-secure-your-mobile-app-with-v-os-app-shield/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/5-simple-and-effective-ways-to-secure-your-mobile-app-with-v-os-app-shield/]]></link>
			<title>5 Simple and Effective Ways to Secure Your Mobile App with V-OS App Shield</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:38:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/is-detection-of-jailbroken-rooted-phone-sufficient-against-threats/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/is-detection-of-jailbroken-rooted-phone-sufficient-against-threats/]]></link>
			<title>Is the detection of jailbroken/rooted phone sufficient against threats?</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:38:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/biometric-mobile-security-vietnam/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/biometric-mobile-security-vietnam/]]></link>
			<title>Vietnam’s New Digital Security Regulations: Strengthening Mobile and Biometric Protections</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:37:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/mobile-security-that-works-for-everyone/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/mobile-security-that-works-for-everyone/]]></link>
			<title>Mobile Security that works for everyone</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:36:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/why-existing-mobile-software-protections-are-insufficient/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/why-existing-mobile-software-protections-are-insufficient/]]></link>
			<title>Why Existing Mobile Software Protections are Insufficient</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:36:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-partners-with-bridge-alliance-to-build-a-safer-digital-ecosystem/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-partners-with-bridge-alliance-to-build-a-safer-digital-ecosystem/]]></link>
			<title>V-Key partners with Bridge Alliance to build a Safer Digital Ecosystem</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:34:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/protect-your-business-all-year-with-v-key-id-and-fido2/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/protect-your-business-all-year-with-v-key-id-and-fido2/]]></link>
			<title>Protect Your Business All Year with V-Key ID and FIDO2</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:33:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-os-protection-against-cpu-vulnerabilities/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-os-protection-against-cpu-vulnerabilities/]]></link>
			<title>V-OS Protection against CPU vulnerabilities</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:33:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/]]></guid>
			<link><![CDATA[https://www.v-key.com/]]></link>
			<title>V-Key | Redefining Digital Identity</title>
			<pubDate><![CDATA[Tue, 19 May 2026 09:19:19 +0000]]></pubDate>
		</item>
				</channel>
</rss>
