Modernizing authentication across energy and natural resource organizations
Attend this webinar on July 19th at 9am PDT to learn best practices to modernize cybersecurity across your critical IT and OT environments with Yubico solutions, to stop modern cyber threats and drive cyber insurance hygiene.
The future of Federal cybersecurity is here
Smart cards, while they provide strong security, can be complex for to adopt both for the organization and the end users alike. Users may even have to carry smart card readers and additional peripherals to use the solution. Read this solution to understand how a modern and simplified smart card approach can augment your existing smart card strategy and provide strong phishing defense in the modern cyber threat landscape. All while being very well suited for your hybrid or remote workforce, with users working across a range of modern desktops, tablets and smart phones.
May 2, 2022
YubiKeys protecting critical IT infrastructure in Ukraine
The Russian invasion of Ukraine is a battle in both the physical and the digital world. On both sides, information warfare plays a more critical part of the battlefield than any other war in human history, with the biggest attack vector and threat being weak login credentials. According to a Ukraine cybersecurity executive at a …
Mar 8, 2022
Forging their own way: Celebrating women in technology on International Women’s Day
With today being International Women’s Day, it’s the perfect time to recognize female pioneers in technology who have made monumental impacts in their chosen fields of healthcare, finance, internet security, and more. Now more than ever, it’s critical that businesses continue to invest in diversity, equity, inclusion, and belonging – simultaneously providing the support and …
Feb 24, 2022
Supply chain security in 2022
The SolarWinds and Colonial Pipeline security breaches are two (of many) incidents that have made supply chain attacks go mainstream. The primary challenge for businesses is that supply chain defense isn’t easy given the hundreds, if not thousands of entry points that need to be monitored along the way. But there are best practices that …
Feb 3, 2022
Who can CISOs trust? Sharing information is both essential and a professional hazard
President Biden’s recent executive order on cybersecurity calls on the public sector to work with private companies to create more secure environments and emphasizes the importance of sharing information as a best practice. Many of us may see “information sharing” as a synonym for risk or liability as information sharing requires a lot of caution. …
Jul 19, 2021
People matter: How to solve security skills shortage challenges
The skills shortage in the security industry stretches as far back as we can remember having an industry. Everyone knows it’s a challenge with no easy short-term solutions. The root of the security skills shortage gap remains murky, and some observers say the pandemic and reallocations of security resources could be widening that gap. The …
Fireside Chat: Protecting High-Risk Individuals from Cyber Threats
Join Stina Ehrensvard, CEO and founder of Yubico, Mary Snapp, VP of Strategic Initiatives at Microsoft and Melanio Escobar, Founder of ReyesAyuda and Executive Director of Humano Derecho for a fireside chat on their vision and approach for stronger internet security.