Creating a robust data encryption strategy in a multi-cloud environment can be challenging. Considerations like availability, fail-over, control, cost and compliance are crucial. For organizations that are encrypting data on-premises and considering moving data to the cloud, a typical approach is to use an on-premises Hardware Security Module (HSM) or a cloud-based HSM. However, acquiring […]
Read moreEvery November, Critical Infrastructure Security and Resilience (CISR) Month focuses on educating the vital role critical infrastructure plays in the nation’s well being. Led by Cybersecurity and Infrastructure Security Agency (CISA), the conversation centers around why it’s important to strengthen critical infrastructure security and resilience. One of the critical infrastructures, energy and natural resources, is […]
Read moreIn today’s ever-evolving cyberthreat landscape, organizations face increasing challenges in securing their sensitive data and systems from sophisticated attacks like AI-strengthened phishing campaigns or impersonation attacks backed by spates of leaked PII . Even in today’s environments where new, ever larger, breaches make news every week, we’re continuing to see enterprises and employees across the […]
Read moreTo address and insulate themselves from the growing trend of cyber security breaches, more businesses are turning to insurance agencies for cyber insurance policies. While these policies have been around in some form since the late 1990s, the fast growing threat landscape and comparative youth of these policies means that rates and limits have fluctuated […]
Read moreWith the expected increase in global travel this holiday season, it’s important to consider your cybersecurity habits while on the go. Traveling can leave ourselves vulnerable to device theft/loss and account breaches. In fact, according to a study by NordVPN, about half of US travelers will use public Wi-Fi, but 63% aren’t even sure they’re […]
Read moreMany federal agencies have been using FIDO authenticators to enable secure access to systems for a variety of use cases. However, they have been deployed in varied configurations and there was a lack of guidance on how to implement the credentials. With the release of a new whitepaper, FIDO Alliance Guidance for U.S. Government Agency […]
Read moreAs part of the revision of the EU common identity framework regulation, also known as eIDAS 2.0, the EU Member States will all implement a new common structure for electronic credentials based on digital identity wallets. The revision is set to take effect everywhere in the EU sometime between 2025 and 2026. Over 250 private […]
Read moreYubico prioritizes collaborating closely with our channel partners – both distributors and resellers – to make it easier to sell YubiKeys to customers around the world. Yubico’s YubiEnterprise Subscription service empowers channel distributors and resellers to quickly and easily deliver YubiKeys-as-a-Service to their customers, helping them accelerate adoption of hardware-based phishing-resistant multi-factor authentication (MFA) at […]
Read moreAmericans spent over 200 billion dollars online during the 2022 holiday shopping season, making 2023 a record year for online retailers. This year, 97% of people recently surveyed said they plan to shop online. As holiday revenues grow, so does the temptation for criminals to take a part of the action for themselves – over […]
Read moreOctober is National Cybersecurity Awareness Month (NCSAM), a dedicated month for the public and private sectors to work together to raise awareness about the importance of cybersecurity and providing individuals and organizations with the resources they need to stay safe from cyber threats. ‘Secure Our World’ is the theme for this year’s NCSAM, and is […]
Read more