Today, together with the FIDO Alliance, we made a big announcement that paves the way to a passwordless future. We revealed the new Security Key by Yubico as well as our new Developer Program, both of which support the new FIDO2 open standard for passwordless authentication. Why is this important? Think of a time when […]
Read moreFor years, both the public and private sector have faced similar challenges when securing the confidentiality, integrity, and availability (CIA triad) of their information systems. Older technologies and policies have historically conflicted with business/organizational objectives when striving for high security. Today, advancements in cryptography and the adoption of newer, improved open standards are eliminating usability […]
Read moreDomains are a frequent target for phishing attacks that pose serious privacy risks and potential losses of millions of dollars in brand damage, lost revenue, stolen data, and recovery efforts. The threat of phishing greatly underscores the need to protect the front door to your domain. We are excited to announce that Gandi is the […]
Read moreToday, the World’s Largest Developer Expo + Conference, DeveloperWeek 2018, opens at the Oakland Convention Center with thousands of developers participating from all over the globe. As a warm up for the conference, hundreds of developers participated in the DevWeek 2018’s hackathon and pulled an all-nighter on Saturday. Over 160 teams coded and collaborated for […]
Read moreOne of the most important facets of enterprise security is ensuring protection for all employee accounts. Password sharing methods play a critical role. When pressed for time, many users resort to sending unencrypted plain-text passwords via high risk channels like chat or email. There are other ways to securely share passwords across teams throughout an […]
Read moreProtecting your organization from a potential data breach starts with providing secure two-factor authentication (2FA) for all employees. Once employees are protected, you need to think about vendors and third parties that have access to your network, customer files, and other sensitive data. Do they have the appropriate protections put in place? According to a […]
Read moreAccording to the NIST SP 800-63-3, digital identity is “the online persona of a subject.” Unlike personal identity, an individual can convey multiple digital identities across various networks and communities. In other words, one person can have one digital identity for their work email and another for a social media account. Given the possibility of […]
Read moreOrganizations that outsource certain business functions to Software-as-a-Service (SaaS) providers enjoy many benefits, including cost efficiency and increased productivity. However, despite the advantages, there also comes the potential risks of privacy and data compromise. Due to the nature of cloud computing, SaaS providers are required to take necessary steps and precautions to prove the security, […]
Read moreRaise your hand if you’re a fan of security products that live up to their name and also deliver a delightful user experience! You know we are, and that’s why we’re happy to announce a joint effort with IBM to deliver FIDO Universal 2nd Factor (U2F) protection with the YubiKey through the IBM Security Access […]
Read moreWith the increasing frequency and scale of identity threats including phishing and man-in-the-middle attacks (MiTM), the best way to prevent a breach is to provide strong multi-factor authentication (MFA). MFA is designed to protect against the range of attacks that rely on stealing user credentials. Organizations can use a variety of techniques, but all work […]
Read more