Tag: cybersecurity

Home » cybersecurity » Page 4
  • The future of Federal cybersecurity is hereSmart cards, while they provide strong security, can be complex for to adopt both for the organization and the end users alike. Users may even have to carry smart card readers and additional peripherals to use the solution. Read this solution to understand how a modern and simplified smart card approach can augment your existing smart card strategy and provide strong phishing defense in the modern cyber threat landscape. All while being very well suited for your hybrid or remote workforce, with users working across a range of modern desktops, tablets and smart phones.Read morecybersecurityExecutive Ordersmart card
  • YubiKeys protecting critical IT infrastructure in UkraineThe Russian invasion of Ukraine is a battle in both the physical and the digital world. On both sides, information warfare plays a more critical part of the battlefield than any other war in human history, with the biggest attack vector and threat being weak login credentials.  According to a Ukraine cybersecurity executive at a […]Read moreauthenticationcybersecuritygovernmentMFAYubiKey
  • Celebrating Women in Tech on International Women’s Day – YubicoWith today being International Women’s Day, it’s the perfect time to recognize female pioneers in technology who have made monumental impacts in their chosen fields of healthcare, finance, internet security, and more. Now more than ever, it’s critical that businesses continue to invest in diversity, equity, inclusion, and belonging – simultaneously providing the support and […]Read morecybersecurityDE&Iwomen in technology
  • Supply chain security in 2022The SolarWinds and Colonial Pipeline security breaches are two (of many) incidents that have made supply chain attacks go mainstream. The primary challenge for businesses is that supply chain defense isn’t easy given the hundreds, if not thousands of entry points that need to be monitored along the way. But there are best practices that […]Read morecybersecuritygovernmentMFAsupply chainYubiKey
  • Who can CISOs trust? Sharing information is both essential and a professional hazardPresident Biden’s recent executive order on cybersecurity calls on the public sector to work with private companies to create more secure environments and emphasizes the importance of sharing information as a best practice. Many of us may see “information sharing” as a synonym for risk or liability as information sharing requires a lot of caution. […]Read moreCISOcybersecuritygovernmentleadership
  • remote workersBest Practices to Secure SMBs in an Evolving Cyberthreat LandscapeLearn how the YubiKey offers phishing-resistant MFA to stop account takeovers, reduce costs, and drive employee productivityRead morecybersecuritysecuritysmb
  • People matter: How to solve security skills shortage challengesThe skills shortage in the security industry stretches as far back as we can remember having an industry. Everyone knows it’s a challenge with no easy short-term solutions. The root of the security skills shortage gap remains murky, and some observers say the pandemic and reallocations of security resources could be widening that gap. The […]Read morecybersecuritysecurity
  • Yubico Research Reveals Lackluster Cybersecurity in EuropeWe all know there have been major paradigm shifts in the workplace caused by the pandemic. With the explosion of working from home (WFH), millions of employees now call their basements and bedrooms home offices. Security professionals scrambled to put together employee onboarding and authentication protocols that met new cybersecurity requirements for remote employees. Over […]Read morecybersecurityMFAwork-from-home
  • Yubico LogoWhat is Malware?Malware Malware, a portmanteau of malicious and software, is the collective term for a variety of software-based attacks with malicious intent, including ransomware, viruses, and spyware. Typically delivered in the form of a file or link over email or text that requires user action to execute, malware is usually code developed by cyberattackers, designed to […]Read morecybersecurity
  • Osterman Cyber Security in GovernmentLearn how the government sector faces a growing complex of cybersecurity threats.Read morecybersecuritygovernmentstate and local government