Tag: MFA

Thumbnail

Manufacturing cybersecurity to step up in response to threats of cyberattacks

Recent manufacturing crises such as the baby formula shortage and the global chip shortage demonstrate the profound impact of downtime and production issues. From the global pandemic to lockdowns in China, manufacturers are now being warned about the risk of cyberattacks from Russia.   Manufacturing is an emerging target for cyberattacks; production floors that were once

Thumbnail

Graduating from legacy MFA to modern authentication

Download the Yubico White Paper, Graduating from legacy MFA to modern authentication: The critical need for increased security across education, to learn authentication best practices in modernizing authentication to stop modern day cyber threats.

Thumbnail

Protecting the supply chain with highest-assurance security

Download the Yubico White Paper, Protecting the supply chain with highest-assurance security: Go passwordless, ensure product integrity, and protect the software supply chain, to learn authentication best practices in securing supply chain integrity.

Thumbnail

Laying the groundwork for continuous authentication

Continuous authentication is an emerging concept—a future ‘nirvana’ state of security that would provide the capability to validate a user’s identity in real-time as they maneuver between systems, applications, and devices. In theory, continuous authentication solutions would use risk signals from a variety of monitoring sources to authenticate users, identify potential threats and proactively remediate

Thumbnail

How to enhance your Adaptive MFA strategy using Yubico’s Java WebAuthn Server

Come learn how to use Yubico’s Java WebAuthn Server to streamline WebAuthn flows based on user’s authenticators

Yubico Releases MFA Guide in Recognition of World Password(less) Day 

PALO ALTO, CA and STOCKHOLM, SWEDEN – May 4, 2022 –  In recognition of World Password Day, Yubico, the leading provider of hardware authentication security keys, today issued a multi-factor authentication (MFA) guide to help better define common and new industry terms, as well as the standards that are supporting modern authentication.   While it is

Thumbnail

Making sense of the alphabet soup within authentication and modern MFA terminology

The vast majority of all cyberattacks start with stolen login passwords or other credentials. In a world that is moving to the cloud, our work, personal and government communication systems have become more accessible and vulnerable for anyone on the internet. Of all the different cyberattacks, credential phishing is by far the largest problem and

Thumbnail

WebAuthn implementation: What’s what, why should you care and new updates from Yubico

When it comes to WebAuthn, there’s certainly no shortage of acronyms or protocols. But what do they mean, and which ones do you need to care about? Fret not – both clarity and help are available! In this blog, we’ll share tips on how to implement WebAuthn, as well as share news about java-webauthn-server library

Thumbnail

YubiKeys protecting critical IT infrastructure in Ukraine

The Russian invasion of Ukraine is a battle in both the physical and the digital world. On both sides, information warfare plays a more critical part of the battlefield than any other war in human history, with the biggest attack vector and threat being weak login credentials.  According to a Ukraine cybersecurity executive at a

Thumbnail

The real reason legacy authentication doesn’t work for shared workstations

Most organizations struggle with legacy authentication, with passwords and mobile-based solutions a source of security risk, high IT cost, and frustrated users. However, for organizations with shared workstations and shared device environments, these pain points are only intensified. Shared workstations—common across industries such as healthcare, manufacturing, retail and hospitality, financial services, energy, utilities, oil and