Tag: cybersecurity
-
Yubico Research Reveals Lackluster Cybersecurity in Europe We all know there have been major paradigm shifts in the workplace caused by the pandemic. With the explosion of working from home (WFH), millions of employees now call their basements and bedrooms home offices. Security professionals scrambled to put together employee onboarding and authentication protocols that met new cybersecurity requirements for remote employees. Over […] Read more -
What is Malware? Malware Malware, a portmanteau of malicious and software, is the collective term for a variety of software-based attacks with malicious intent, including ransomware, viruses, and spyware. Typically delivered in the form of a file or link over email or text that requires user action to execute, malware is usually code developed by cyberattackers, designed to […] Read more -
Osterman Cyber Security in Government Learn how the government sector faces a growing complex of cybersecurity threats. Read more -
YubiKey for the Essential Eight brief Learn about the Essential Eight mitigation strategies and how phishing-resistant MFA like the YubiKey helps Australian organisations stay compliant with Maturity Levels 2 & 3. Read more -
4 things ‘Among Us’ can teach professionals about authentication You’re making good progress on this task. One more data upload and then you’re out of here. But right before you can complete the upload, a klaxon blares. There’s been an attack! Time to head to the meeting room for the usual finger-pointing and scapegoating before the team decides who to jettison from the ship. […] Read more -
What is eIDAS? What is an eID? eID stands for Electronic Identification and it is a way to secure a person’s identity to access online services in the European Union. Where can security keys fit into this? Several European countries are now in the process of deploying modern web authentication, such as security keys to their citizens. Security […] Read more -
What is DFARS? DFARS DFARS stands for Defense Federal Acquisition Regulation Supplement. The Department of Defense uses it to protect confidential information. Why is DFARS implemented? Government employees and contractors are likely to be targeted by hackers and nation-states, so authentication solutions need to be resistant to phishing and account takeovers, and comply with federal regulations. DFARS provides a […] Read more -
Yubico proposes WebAuthn protocol extension to simplify backup security keys One of the most common questions people have about YubiKeys, and security keys in general, is: “What if I lose my key?” While WebAuthn and FIDO2, the open standards for security key authentication, promise strong, phishing-resistant and — perhaps most importantly — easy-to-use multi-factor authentication, this question still remains. As of today, there are no answers that […] Read more -
Cybersecurity glossary A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Zero Trust Framework The term zero trust (ZT) or zero trust network access (ZTNA) refers to a comprehensive security approach and framework that fundamentally redefines the traditional notion of […] Read more -
Osterman Research Cyber Security in Financial Services The financial services industry is under cyber attack. Read more