Catch today’s webinar: Next-gen Identity Management

users around a computer

Are your users really who they claim to be? What is the impact to your business if your end-users are registering as fake individuals, or impersonating others? If the identity of your users matters to your business, then you’ll want to join today’s webinar hosted by SC Magazine.

Identity, the internet, and your business—architecting your online product/service once was as simple as enabling someone to create a user name and a password. It’s not that easy or simple anymore. User names are easily guessed and passwords are easily breached. The answer, of course, is that identity and access management software need to be absolutely certain that the identity is correct and not an attacker pretending to be the authorized user. NIST 800-63-3 recommends combining identity proofing with multi-factor authentication.

Tune in to today’s webinar on next-gen identity management. Yubico’s foremost Identity expert, John Bradley will chat with SC Media’s Editor, Stephen Lawton about identity proofing in the real world, and how companies can ensure a user’s identity is accurate and not an imposter.

About John Bradley

John has over 15 years experience in the information technology and identity management field. He advises Government Agencies and commercial organizations on the policy and technical requirements of Identity Management, Federated Identity, PKI and smart card solutions. He is often consulted and brought in to brief clients, vendors, staff, and standards organizations on complex state-of-the-art identity management concepts, best practices, and technical requirements because of his amazing ability to make complex topics simple.

Talk to our teamTalk to our team

Share this article:


  • Your top YubiKey questions, answeredOver the 10+ years I’ve been at Yubico, I’ve had the pleasure of meeting customers, partners and many others talking about digital security. While every conversation is different, I am often asked many of the same questions about YubiKeys. One thing remains consistent: many people know they need better security, but they’re not sure what […]Read moreFAQYubiKey
  • Works with YubiKey Spotlight: Passkeys are here – are you ready?With 2025 at its midpoint, enterprises worldwide are grappling with how to protect their users and data against emerging challenges around user security. Since 2022, generative AI has fueled a 4,000% surge in phishing – exploiting human vulnerability in 68% of breaches. It’s no longer a question – the world has a password problem that […]Read morepartnerspasskeysWorks with YubiKeywwyk
  • Yubico LogoYubico liefert PIN-Verbesserungen mit dem neuen YubiKey 5 – Verbesserte PIN-SchlüsselUm sich auf die sich ständig weiterentwickelnden Cyber-Bedrohungen vorzubereiten, passen Regierungen weltweit die Authentifizierungsanforderungen für Online-Dienste an und aktualisieren sie, was direkte Auswirkungen auf viele Unternehmen und deren Mitarbeiter hat. Zwar gibt es derzeit keine universelle Regelung für eine robustere Multi-Faktor-Authentifizierung (MFA), doch wird deren Notwendigkeit in einer Reihe von Anforderungen hervorgehoben, darunter PSD2, DSGVO […]Read moreYubiKey
  • Yubico delivers PIN advancements with new YubiKey 5 – Enhanced PIN keysTo prepare for continuously evolving cyber threats, governments around the world are adapting and updating authentication requirements for online services which directly impact thousands of organizations and their employees. While there’s currently no universal regulation for more robust multi-factor authentication (MFA), the need is highlighted across a range of requirements including PSD2, GDPR, and the […]Read moreCompany NewsProduct NewsYubiKeyYubiKey 5 – Enhanced PINYubiKey 5 SeriesYubiKey as a Service