Tag: cybersecurity

Home » cybersecurity » Page 5
  • Identify Yourself: Cyber threat protection strategies in state and local governmentLessons learned from 2020 that can inform cybersecurity planning in the years ahead.Read morecybersecuritystate and local government
  • Essential Eight solution briefYubiKey for the Essential Eight briefLearn about the Essential Eight mitigation strategies and how phishing-resistant MFA like the YubiKey helps Australian organisations stay compliant with Maturity Levels 2 & 3.Read morecybersecurityphishing-resistant MFAYubiKey
  • 4 things ‘Among Us’ can teach professionals about authenticationYou’re making good progress on this task. One more data upload and then you’re out of here. But right before you can complete the upload, a klaxon blares. There’s been an attack! Time to head to the meeting room for the usual finger-pointing and scapegoating before the team decides who to jettison from the ship. […]Read moreauthenticationcybersecurityremote workerssecurity
  • Yubico LogoWhat is eIDAS?What is an eID? eID stands for Electronic Identification and it is a way to secure a person’s identity to access online services in the European Union. Where can security keys fit into this? Several European countries are now in the process of deploying modern web authentication, such as security keys to their citizens. Security […]Read morecybersecurityeidassecurity keyYubiKey
  • Yubico LogoWhat is DFARS?DFARS DFARS stands for Defense Federal Acquisition Regulation Supplement. The Department of Defense uses it to protect confidential information. Why is DFARS implemented? Government employees and contractors are likely to be targeted by hackers and nation-states, so authentication solutions need to be resistant to phishing and account takeovers, and comply with federal regulations. DFARS provides a […]Read morecybersecuritydfarsphishing
  • Yubico proposes WebAuthn protocol extension to simplify backup security keysOne of the most common questions people have about YubiKeys, and security keys in general, is: “What if I lose my key?”  While WebAuthn and FIDO2, the open standards for security key authentication, promise strong, phishing-resistant and — perhaps most importantly — easy-to-use multi-factor authentication, this question still remains. As of today, there are no answers that […]Read morecybersecuritysecurity keyWebAuthn
  • Yubico LogoCybersecurity glossaryA B C D E F G H I J K L M N O P Q R S T U V W X Y Z Zero Trust Framework The term zero trust (ZT) or zero trust network access (ZTNA) refers to a comprehensive security approach and framework that fundamentally redefines the traditional notion of […]Read morecybersecurity
  • Osterman Research Cyber Security in Financial ServicesThe financial services industry is under cyber attack.Read morecybersecurityfinancial services
  • Weathering the Perfect StormSecuring the cyber-physcial systems of critical infrastructure. Read morecybersecurity
  • 2020 State of Password and Authentication Security Behaviors ReportThe 2020 State of Password and Authentication Security Behaviors Report Research sponsored by Yubico Independently Conducted by Ponemon Institute LLC February 2020Read moreauthenticationcybersecurity