Tag: authentication

Your Bridge to Passwordless: Key Considerations When Building a Secure Passwordless Strategy

Learn about the key considerations to take into account when determining your path to passwordless, so that you can enhance organizational security while delivering users a fast and easy user experience.

Your Bridge to Passwordless: Separating fact from fiction in your journey

“Passwordless” can feel like a loaded term, with the security industry filled with differing and contradictory positions on the topic. The purpose of this whitepaper is to take an objective approach to understand the challenges that passwords present, what “passwordless” means, and what enterprises can expect moving forward as passwordless authentication matures.

Federal government authentication lessons

Learn what the government did right and what challenges still lie ahead.

Authentication Best Practices to Protect Against Identity Phishing

Learn what strong authentication really is, why it’s key for enterprise-wide identity assurance.

YubiKey FIPS Series

The series at a glance

4 things ‘Among Us’ can teach security professionals about authentication

You’re making good progress on this task. One more data upload and then you’re out of here. But right before you can complete the upload, a klaxon blares. There’s been an attack! Time to head to the meeting room for the usual finger-pointing and scapegoating before the team decides who to jettison from the ship.

What is authentication assurance?

Learn More NIST publishes new authentication standards, FIDO U2F achieves AAL3 Developer Resources YubiKey PIV tool and NIST

What is a Man-in-the-Middle (MiTM) Attack?

Learn More Why the YubiKey wins Creating the unphishable security key Developer Resources Security breaches and webauthn