Tag: cybersecurity
-
Identify Yourself: Cyber threat protection strategies in state and local government Lessons learned from 2020 that can inform cybersecurity planning in the years ahead. Read more cybersecurity state and local government -
YubiKey for the Essential Eight brief Learn about the Essential Eight mitigation strategies and how phishing-resistant MFA like the YubiKey helps Australian organisations stay compliant with Maturity Levels 2 & 3. Read more cybersecurity phishing-resistant MFA YubiKey -
4 things ‘Among Us’ can teach professionals about authentication You’re making good progress on this task. One more data upload and then you’re out of here. But right before you can complete the upload, a klaxon blares. There’s been an attack! Time to head to the meeting room for the usual finger-pointing and scapegoating before the team decides who to jettison from the ship. […] Read more authentication cybersecurity remote workers security -
What is eIDAS? What is an eID? eID stands for Electronic Identification and it is a way to secure a person’s identity to access online services in the European Union. Where can security keys fit into this? Several European countries are now in the process of deploying modern web authentication, such as security keys to their citizens. Security […] Read more cybersecurity eidas security key YubiKey -
What is DFARS? DFARS DFARS stands for Defense Federal Acquisition Regulation Supplement. The Department of Defense uses it to protect confidential information. Why is DFARS implemented? Government employees and contractors are likely to be targeted by hackers and nation-states, so authentication solutions need to be resistant to phishing and account takeovers, and comply with federal regulations. DFARS provides a […] Read more cybersecurity dfars phishing -
Yubico proposes WebAuthn protocol extension to simplify backup security keys One of the most common questions people have about YubiKeys, and security keys in general, is: “What if I lose my key?” While WebAuthn and FIDO2, the open standards for security key authentication, promise strong, phishing-resistant and — perhaps most importantly — easy-to-use multi-factor authentication, this question still remains. As of today, there are no answers that […] Read more cybersecurity security key WebAuthn -
Cybersecurity glossary A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Zero Trust Framework The term zero trust (ZT) or zero trust network access (ZTNA) refers to a comprehensive security approach and framework that fundamentally redefines the traditional notion of […] Read more cybersecurity -
Osterman Research Cyber Security in Financial Services The financial services industry is under cyber attack. Read more cybersecurity financial services -
Weathering the Perfect Storm Securing the cyber-physcial systems of critical infrastructure. Read more cybersecurity -
2020 State of Password and Authentication Security Behaviors Report The 2020 State of Password and Authentication Security Behaviors Report Research sponsored by Yubico Independently Conducted by Ponemon Institute LLC February 2020 Read more authentication cybersecurity