Tag: federal government

Thumbnail

Modern MFA for the Federal Government: How the YubiKey Meets U.S. Federal Government Requirements

Learn how the YubiKey, a DOD approved alternate authenticator meets federal PIV/CAC requirements and government compliance regulations.

Thumbnail

Modern Authentication for the Federal Government: Enabling Mobile, Secure Authentication in Zero Trust Environments

Learn how DOD approved hardware security keys such as the YubiKey are ideal to fill PIV and CAC related authentication gaps across the federal government, and meet the MFA mandate in the Biden Executive Order 14028.

Thumbnail

Strong Authentication for U.S. Government Employees

Learn how to attain PIV compliance and the recent U.S. Cybersecurity Executive Order mandates that federal government agencies adopt multi-factor authentication (MFA) within 180 days.

Thumbnail

New-Era Authentication: For Federal Zero Trust Initiative

Read the SNG Fedscoop Report on new era authentication and how it aligns with the new White House Executive Order on protecting the nation’s cybersecurity.

Thumbnail

Federal government authentication lessons

Learn what the government did right and what challenges still lie ahead.

Thumbnail

Telework impact on Cybersecurity across Federal Government

How agency leaders see OMB’s M-19-17 and M-20-19 NS telework evolving authentication across the federal government.

Thumbnail

Portable root of trust for government

The YubiKey is a portable root for remote workers, non PIV/CAC eligible workers, mobile/BYOD, and shared devices/workstations.

Thumbnail

How the YubiKey Helps Department of Defense Contractors Meet the Cybersecurity Maturity Model Certification

The CMMC is the Department of Defense’s unified standard for implementing cybersecurity.

Thumbnail

DUO Federal partner brief

Duo and Yubico together satisfy government guidance.

Thumbnail

Why 3 government agencies are relying on hardware-based MFA with YubiKeys

America’s government is under attack. To put it more accurately, its governments are under attack, all the time, at every level — federal, state, and local — from opportunistic scammers, sophisticated cybercriminals, and even state actors. We’ve all seen the stories about intelligence services stealing political emails, snooping into election systems, and even penetrating the US power grid. But those are just