Tag: cybersecurity

What is Malware

Malware Malware, a portmanteau of malicious and software, is the collective term for a variety of software-based attacks with malicious intent, including ransomware, viruses, and spyware. Typically delivered in the form of a file or link over email or text that requires user action to execute, malware is usually code developed by cyberattackers, designed to

Thumbnail

Osterman Cyber Security in Government

Learn how the government sector faces a growing complex of cybersecurity threats.

Thumbnail

Telework impact on Cybersecurity across Federal Government

How agency leaders see OMB’s M-19-17 and M-20-19 NS telework evolving authentication across the federal government.

Thumbnail

Osterman Research White Paper: Cybersecurity in Education

Learn how the education sector faces a growing complex of cybersecurity threats.

Thumbnail

Identify Yourself: Cyber threat protection strategies in state and local government

Lessons learned from 2020 that can inform cybersecurity planning in the years ahead.

Thumbnail

YubiKey for the Essential Eight brief

How a YubiKey solution complies with the mitigation strategy to limit the extent of cyber security incidents.

Thumbnail

4 things ‘Among Us’ can teach security professionals about authentication

You’re making good progress on this task. One more data upload and then you’re out of here. But right before you can complete the upload, a klaxon blares. There’s been an attack! Time to head to the meeting room for the usual finger-pointing and scapegoating before the team decides who to jettison from the ship.

What is eIDAS?

What is an eID? eID stands for Electronic Identification and it is a way to secure a person’s identity to access online services in the European Union. Where can security keys fit into this? Several European countries are now in the process of deploying modern web authentication, such as security keys to their citizens. Security

What is DFARS?

DFARS DFARS stands for Defense Federal Acquisition Regulation Supplement. The Department of Defense uses it to protect confidential information. Why is DFARS implemented? Government employees and contractors are likely to be targeted by hackers and nation-states, so authentication solutions need to be resistant to phishing and account takeovers, and comply with federal regulations. DFARS provides a

Thumbnail

Nov 16, 2020

Yubico proposes WebAuthn protocol extension to simplify backup security keys

One of the most common questions people have about YubiKeys, and security keys in general, is: “What if I lose my key?”  While WebAuthn and FIDO2, the open standards for security key authentication, promise strong, phishing-resistant and — perhaps most importantly — easy-to-use multi-factor authentication, this question still remains. As of today, there are no answers that