Tag: cybersecurity
-
The future of Federal cybersecurity is here Smart cards, while they provide strong security, can be complex for to adopt both for the organization and the end users alike. Users may even have to carry smart card readers and additional peripherals to use the solution. Read this solution to understand how a modern and simplified smart card approach can augment your existing smart card strategy and provide strong phishing defense in the modern cyber threat landscape. All while being very well suited for your hybrid or remote workforce, with users working across a range of modern desktops, tablets and smart phones. Read more cybersecurity Executive Order smart card -
YubiKeys protecting critical IT infrastructure in Ukraine The Russian invasion of Ukraine is a battle in both the physical and the digital world. On both sides, information warfare plays a more critical part of the battlefield than any other war in human history, with the biggest attack vector and threat being weak login credentials. According to a Ukraine cybersecurity executive at a […] Read more authentication cybersecurity government MFA YubiKey -
Celebrating Women in Tech on International Women’s Day – Yubico With today being International Women’s Day, it’s the perfect time to recognize female pioneers in technology who have made monumental impacts in their chosen fields of healthcare, finance, internet security, and more. Now more than ever, it’s critical that businesses continue to invest in diversity, equity, inclusion, and belonging – simultaneously providing the support and […] Read more cybersecurity DE&I women in technology -
Supply chain security in 2022 The SolarWinds and Colonial Pipeline security breaches are two (of many) incidents that have made supply chain attacks go mainstream. The primary challenge for businesses is that supply chain defense isn’t easy given the hundreds, if not thousands of entry points that need to be monitored along the way. But there are best practices that […] Read more cybersecurity government MFA supply chain YubiKey -
Who can CISOs trust? Sharing information is both essential and a professional hazard President Biden’s recent executive order on cybersecurity calls on the public sector to work with private companies to create more secure environments and emphasizes the importance of sharing information as a best practice. Many of us may see “information sharing” as a synonym for risk or liability as information sharing requires a lot of caution. […] Read more CISO cybersecurity government leadership -
Best Practices to Secure SMBs in an Evolving Cyberthreat Landscape Learn how the YubiKey offers phishing-resistant MFA to stop account takeovers, reduce costs, and drive employee productivity Read more cybersecurity security smb -
People matter: How to solve security skills shortage challenges The skills shortage in the security industry stretches as far back as we can remember having an industry. Everyone knows it’s a challenge with no easy short-term solutions. The root of the security skills shortage gap remains murky, and some observers say the pandemic and reallocations of security resources could be widening that gap. The […] Read more cybersecurity security -
Yubico Research Reveals Lackluster Cybersecurity in Europe We all know there have been major paradigm shifts in the workplace caused by the pandemic. With the explosion of working from home (WFH), millions of employees now call their basements and bedrooms home offices. Security professionals scrambled to put together employee onboarding and authentication protocols that met new cybersecurity requirements for remote employees. Over […] Read more cybersecurity MFA work-from-home -
What is Malware? Malware Malware, a portmanteau of malicious and software, is the collective term for a variety of software-based attacks with malicious intent, including ransomware, viruses, and spyware. Typically delivered in the form of a file or link over email or text that requires user action to execute, malware is usually code developed by cyberattackers, designed to […] Read more cybersecurity -
Osterman Cyber Security in Government Learn how the government sector faces a growing complex of cybersecurity threats. Read more cybersecurity government state and local government