Over the last two years, students, faculty and administrators of academic and educational institutions have faced many challenges, including jumping between in-person and remote learning. With the introduction of new and shared devices to accommodate these ever-changing environments, hackers quickly took advantage of the gaps in account security that hadn’t yet been accounted for, which […]
Read moreThe tragic events in Ukraine have forced neighboring states to suddenly reevaluate their defense policies. Finland, which shares over 1000km of border with Russia, is on high-alert while in recent months ordinary Swedes have rushed to join the Hemvärnet, Sweden’s military’s reserve force, in record numbers. Most notably, the threat of Russian attack has convinced […]
Read moreThe education sector currently faces the highest volume of cyberattacks of any sector, with 60% of educational institutions (higher and lower) suffering ransomware attacks in 2021. Cyberattacks are a source of significant cost and can cause major disruption to school operations, which was the case of the recent attacks at UMass and Baltimore County Public […]
Read moreThe world of cybersecurity continues changing rapidly. This has been catalyzed by the sudden shift to remote work, the increasing threat of cybercrime and the complexity of attacks. Understanding the new technological landscape, and what comes next, can be challenging. Hearing from experts who spend their daily lives not only thinking about and facing these […]
Read moreRecent manufacturing crises such as the baby formula shortage and the global chip shortage demonstrate the profound impact of downtime and production issues. From the global pandemic to lockdowns in China, manufacturers are now being warned about the risk of cyberattacks from Russia. Manufacturing is an emerging target for cyberattacks; production floors that were once […]
Read moreDownload the Yubico White Paper, Graduating from legacy MFA to modern authentication: The critical need for increased security across education, to learn authentication best practices in modernizing authentication to stop modern day cyber threats.
Read moreDownload the Yubico White Paper, Protecting the supply chain with highest-assurance security: Go passwordless, ensure product integrity, and protect the software supply chain, to learn authentication best practices in securing supply chain integrity.
Read moreContinuous authentication is an emerging concept—a future ‘nirvana’ state of security that would provide the capability to validate a user’s identity in real-time as they maneuver between systems, applications, and devices. In theory, continuous authentication solutions would use risk signals from a variety of monitoring sources to authenticate users, identify potential threats and proactively remediate […]
Read moreCome learn how to use Yubico’s Java WebAuthn Server to streamline WebAuthn flows based on user’s authenticators
Read morePALO ALTO, CA and STOCKHOLM, SWEDEN – May 4, 2022 – In recognition of World Password Day, Yubico, the leading provider of hardware authentication security keys, today issued a multi-factor authentication (MFA) guide to help better define common and new industry terms, as well as the standards that are supporting modern authentication. While it is […]
Read more