Archive
Stay up to date on company and partner news, product tips, and industry trends.
-
YubiEnterprise Delivery Service expands to 49 countries to help customers increase remote work security for distributed workforces
The past two years have seen a tremendous amount of change regarding normal business processes for companies around the world, and our customers are no exception. When YubiEnterprise Delivery was first launched in May of 2020, organizations and their workforces, partners, and customers were just beginning to grapple with the new challenges that the pandemic […]
Read more -
A new White House directive: Phishing-resistant MFA!
The US Government’s Office of Management and Budget recently issued its Zero Trust Strategy, which would require that Federal agencies only use phishing-resistant multi-factor authentication. This strategy comes on the heels of a number of other actions from the Executive Office of the President including a cybersecurity executive order in May. This executive order directed […]
Read more -
The top 5 mobile authentication misconceptions: Demystifying the myth versus reality of legacy MFA
Download the Yubico White Paper, The top 5 mobile authentication misconceptions to learn the key misconceptions related to mobile-based MFA that are a ticking time bomb, and putting organizations at risk.
Read more -
Zero Trust is the new regulatory minimum for Federal agencies: what does that mean for authentication?
The deadline is looming for federal agencies to implement impersonation-resistant multi-factor authentication (MFA), just one of the new stronger security requirements under President Biden’s new cybersecurity executive order (EO 14028). The EO puts security front and center to address some of the worst cyber attacks against the federal government, setting up new federal compliance expectations […]
Read more -
Modern hardware-backed MFA and compliance for Federal Government: How the YubiKey meets US Federal Government regulations
Learn how the YubiKey, a DOD approved alternate authenticator meets federal PIV/CAC requirements and government compliance regulations.
Read more -
Modern Authentication for the Federal Government: Enabling Mobile, Secure Authentication in Zero Trust Environments
Learn how DOD approved hardware security keys such as the YubiKey are ideal to fill PIV and CAC related authentication gaps across the federal government, and meet the MFA mandate in the Biden Executive Order 14028.
Read more -
What is Strong Authentication
Strong Authentication Definition Strong authentication confirms user identity reliably and safely, never solely based on shared secrets/symmetric keys such as passwords, codes, and recovery questions. Strong authentication assumes credential phishing and impersonation attacks are inevitable and robustly repels them. Although multi-factor authentication (MFA) remains among the best ways to establish who trusted users are, actual […]
Read more -
Yubico research reveals that cybersecurity best practices, including password protection, and employee training in the UK, France, and Germany are lackluster with the proliferation of employees working from home
We all know there have been major paradigm shifts in the workplace caused by the pandemic. With the explosion of working from home (WFH), millions of employees now call their basements and bedrooms home offices. Security professionals scrambled to put together employee onboarding and authentication protocols that met new cybersecurity requirements for remote employees. Over […]
Read more -
Figma implements strong security for all its employees with Okta and the YubiKey
About our customer Figma The challenge: Figma enforces a new security paradigm In the last quarter of 2020, Figma looked for ways to implement strong authentication protection against potential phishing attacks for remote employees. Figma uses Okta as its identity provider (IdP). After a careful consideration of all the authentication methods available in Okta Adaptive […]
Read more -
SANS 2021 Password Management and Two-Factor Authentication Methods Survey
Read this report to learn about password management and the types of MFA solutions being used in industries
Read more