Author: Josh Cigna
-
Navigating the PCI DSS 4.0 transition and meeting compliance with phishing-resistant YubiKeys In just a few days, on March 31, 2025, decision makers in industries that involve payment processing – including financial services, retail & hospitality and telecommunications – are tasked to finalize the transition to Payment Card Industry Data Security Standard (PCI DSS) 4.0. This deadline marks a critical juncture for all organizations handling payment card […] Read more NIST PCI DSS PCI DSS 4.0 -
Securing critical infrastructure from modern cyber threats with phishing-resistant authentication Across the globe, 2024 has seen a whirlwind of change. With ongoing wars, recent political change-ups and more, growth in data breaches targeting critical infrastructure continue to be on the rise. Critical infrastructure is integral to our everyday life – from the energy and natural resources powering our hospitals and providing clean drinking water, telco […] Read more CISA critical infrastructure zero trust -
National Security Memorandum on AI: Key takeaways and recommendations Late last week, the White House issued a National Security Memorandum (NSM) on Artificial Intelligence (AI) which aims to ensure that ongoing and future advancements in AI technologies are beneficial to the US public. The memorandum also ensures that the US remains the top location to incubate and innovate in this developing space. Yubico applauds […] Read more AI federal government passkeys -
Operational Technology (OT) security: Key risks and mitigation strategies to achieve phishing-resistance Operational Technology (OT) is a critical component of several industries as it powers the systems that control the distribution of power, water and other utilities, drives the machinery that powers manufacturing, and controls everything from traffic lights to tanker ships. With the OT space under constant threat from cyber attacks, it’s more important than ever […] Read more Operational Technology OT zero trust -
Adapting to new cybersecurity regulations and addressing evolving threats within financial services In late 2023, the U.S. subsidiary of the Industrial and Commercial Bank of China was hit with ransomware, creating a ripple effect across the U.S. Treasury market. In February 2024, Bank of America reported a breach impacting 57,000 account holders related to a compromise with a third-party software provider. And as recently as June, a […] Read more financial services NIST PCI DSS phishing-resistant MFA -
QR codes within enterprise security: Key considerations and best practices Every second, a phishing attack takes place. In fact, over 80% of cyber attacks are a result of stolen login credentials from attacks like phishing – mostly due to the relatively low cost and high success rate to execute these attacks. Unfortunately, this pattern will continue to grow as attackers become more sophisticated, utilizing tools […] Read more phishing-resistant MFA QR Code Phishing Quishing -
QR code phishing attacks (Quishing): What to know and how to stay secure If you immediately think of email when you think of phishing, you’re not alone. However, a new form of a text-based scam is making waves – highlighted by a seemingly legitimate text from the USPS which lets receivers know that their “package” arrived at the warehouse. To receive the package, it instructs users to click […] Read more best practices phishing QR Code Phishing Quishing -
Resolve to be cyber resilient: Moving on from legacy MFA in energy and natural resources Every November, Critical Infrastructure Security and Resilience (CISR) Month focuses on educating the vital role critical infrastructure plays in the nation’s well being. Led by Cybersecurity and Infrastructure Security Agency (CISA), the conversation centers around why it’s important to strengthen critical infrastructure security and resilience. One of the critical infrastructures, energy and natural resources, is […] Read more CISA energy and natural resources PIV smart card -
Transcending passwordless authentication with HYPR and Yubico In today’s ever-evolving cyberthreat landscape, organizations face increasing challenges in securing their sensitive data and systems from sophisticated attacks like AI-strengthened phishing campaigns or impersonation attacks backed by spates of leaked PII . Even in today’s environments where new, ever larger, breaches make news every week, we’re continuing to see enterprises and employees across the […] Read more HYPR partner passwordless survey -
Phishing-resistant MFA helps businesses reduce risk and costs in the face of a rapidly changing cyber insurance landscape To address and insulate themselves from the growing trend of cyber security breaches, more businesses are turning to insurance agencies for cyber insurance policies. While these policies have been around in some form since the late 1990s, the fast growing threat landscape and comparative youth of these policies means that rates and limits have fluctuated […] Read more case study cyber insurance partner
1
2
Next Page