Tag: compliance

Thumbnail

May 3, 2021

A Yubico first…introducing the YubiHSM 2 FIPS

Compliance mandates require many of our customers in regulated industries or in high-risk environments to prove adequate levels of protection for their data, no matter where it lives or travels. This is why today we’ve not only launched the YubiKey 5 FIPS Series but also the smallest FIPS-validated hardware security module (HSM) in the world,

Thumbnail

Top 10 security regulations you need to know about in the U.S. and EU

Compliance has always been part of routine planning and development for security experts in the enterprise. But recent headline-grabbing attacks like the SolarWinds incident may have pushed compliance much higher up the priority list. It’s difficult to track the dizzying array of regulations on both sides of the pond and what they require, so we’ve

Thumbnail

Portable root of trust for government

The YubiKey is a portable root for remote workers, non PIV/CAC eligible workers, mobile/BYOD, and shared devices/workstations.

Thumbnail

How the YubiKey Helps Department of Defense Contractors Meet the Cybersecurity Maturity Model Certification

The CMMC is the Department of Defense’s unified standard for implementing cybersecurity.

For compliance

Modern strong authenticationfor governments and highly security-conscious organizations The YubiKey 5 FIPS Series provides FIPS 140-2 validated strong phishing-resistant two-factor, multi-factor, and passwordless authentication at scale, helping government agencies and highly regulated enterprises drive compliance to global and local industry regulations. Securing Your Critical Assets in an Ever-Changing Regulatory Environment Learn about Security, Compliance, and

Thumbnail

SociaNOVA case study

SociaNova uses free open source software to rapibly roll out YubiKeys.

Thumbnail

Retail point of sale provider provides PCI compliance and easy multi-factor authentication with YubiKey

YubiKeys plus Cisco’s Duo Security MFA provide an easily understood, implemented, and managed solution.

Thumbnail

CMMC: Recommendations to navigate the new Cyber Certification requirements

What does Cybersecurity Maturity Model Certification (CMMC) compliance entail? How to get started.

Thumbnail

Dec 7, 2017

Security and compliance—a top priority for Sentry

Organizations that outsource certain business functions to Software-as-a-Service (SaaS) providers enjoy many benefits, including cost efficiency and increased productivity. However, despite the advantages, there also comes the potential risks of privacy and data compromise. Due to the nature of cloud computing, SaaS providers are required to take necessary steps and precautions to prove the security,

Thumbnail

Nov 1, 2017

The key to DFARS/NIST Compliance

There are only 8 weeks left before the Defense Federal Acquisition Regulation Supplement (DFARS) deadline, and now is the right time for US government contractors to secure Active Directory users. DFARS compliance was structured to protect unclassified US Department of Defense (DoD) information on a contractor’s internal information system from cyber incidents, and to minimize