Tag: MFA


Apr 13, 2022
Shopping for cyber insurance? Six questions to ask before you call the insurer
The cyberthreat landscape has always been worrisome, but today there are many more CISOs noticing new gray hairs in the mirror given an anticipated uptick in cyber attacks from nation states and other bad actors. Ransomware attacks and other forms of account compromise continue to grace the news every month with malicious actors – state-sponsored …
Cyber Insurance requirements
Cyber insurance requirements are fast changing in light of large financial payouts due to cybersecurity breaches. YubiKeys deliver phishing-resistant MFA to stop breaches.

Apr 4, 2022
Q&A: Yubico’s Co-Founder & Chief Innovation Officer Jakob Ehrensvärd
It’s not every day you get to hear a pioneer of internet security share why you and the rest of the world needs modern, reliable and easy-to-use Multi-Factor Authentication (MFA). If you want to understand phishing-resistant authentication and why it matters, there’s nobody better to ask than Jakob Ehrensvärd, Yubico’s co-founder. Jakob built his first …

Mar 30, 2022
White House declaration: act now for cybersecurity attack protection
Last week, President Biden made a statement that couldn’t have been clearer in its message regarding cybersecurity attack protection to the private sector: “If you have not already done so, I urge our private sector partners to harden your cyber defenses immediately by implementing the best practices we have developed together over the last year …

Mar 3, 2022
Security considerations for the top 8 mobile device-restricted workplaces
When looking at enterprises and organizations, there are many different business scenarios that can be present when addressing secure authentication. Whether those be shared workstations, remote workers, or even privileged accounts, there is one in particular that introduces its own difficulties: mobile device-restricted workplaces. It’s safe to say that there will always be workplaces which, …

Feb 24, 2022
Supply chain security in 2022
The SolarWinds and Colonial Pipeline security breaches are two (of many) incidents that have made supply chain attacks go mainstream. The primary challenge for businesses is that supply chain defense isn’t easy given the hundreds, if not thousands of entry points that need to be monitored along the way. But there are best practices that …

Feb 22, 2022
Privileged Access Management at CERN: Q&A with Dr. Stefan Lüders
In an era of increasing cyber attacks, how do you balance the desire for unrestricted research freedom against the need to protect that research from cyber threats? This is the challenge faced by CERN, leaders in the scientific research community. Their solution? Provide a clear articulation of what constitutes privileged data, and create flexible security …

Feb 2, 2022
Google Chrome U2F API decommission: What the change means for your users and how to prepare
With advancement often comes change. Some changes are exciting, like providing new features and broader support, while other changes can be a minimal bump in the road or, in extreme cases, cause adverse effects on end users. With Yubico’s commitment to keeping our customers updated on the latest in changes to security protocols, we wanted …

Jan 26, 2022
Salesforce is requiring MFA: Why this matters and what you can do
As sophisticated cyberattacks continue their relentless pursuit towards SMBs and enterprises, companies must prioritize improvements to their cybersecurity infrastructure to better secure their customers, employees, and partners. Username and passwords no longer provide adequate security against the ever evolving landscape of cyberattacks. Late last year, Salesforce took a strong and decisive stance, announcing that beginning …