Download the Yubico White Paper, The top 5 mobile authentication misconceptions to learn the key misconceptions related to mobile-based MFA that are a ticking time bomb, and putting organizations at risk.
Read moreThe deadline is looming for federal agencies to implement impersonation-resistant multi-factor authentication (MFA), just one of the new stronger security requirements under President Biden’s new cybersecurity executive order (EO 14028). The EO puts security front and center to address some of the worst cyber attacks against the federal government, setting up new federal compliance expectations […]
Read moreLearn how the YubiKey, a DOD approved alternate authenticator meets federal PIV/CAC requirements and government compliance regulations.
Read moreLearn how DOD approved hardware security keys such as the YubiKey are ideal to fill PIV and CAC related authentication gaps across the federal government, and meet the MFA mandate in the Biden Executive Order 14028.
Read moreStrong Authentication Definition Strong authentication confirms user identity reliably and safely, never solely based on shared secrets/symmetric keys such as passwords, codes, and recovery questions. Strong authentication assumes credential phishing and impersonation attacks are inevitable and robustly repels them. Although multi-factor authentication (MFA) remains among the best ways to establish who trusted users are, actual […]
Read moreWe all know there have been major paradigm shifts in the workplace caused by the pandemic. With the explosion of working from home (WFH), millions of employees now call their basements and bedrooms home offices. Security professionals scrambled to put together employee onboarding and authentication protocols that met new cybersecurity requirements for remote employees. Over […]
Read moreAbout our customer Figma The challenge: Figma enforces a new security paradigm In the last quarter of 2020, Figma looked for ways to implement strong authentication protection against potential phishing attacks for remote employees. Figma uses Okta as its identity provider (IdP). After a careful consideration of all the authentication methods available in Okta Adaptive […]
Read moreRead this report to learn why multi-factor authentication is critical for state and local government agencies, the consequences of not strengthening authentication, and how to bridge to a passwordless future
Read moreCome learn what the 451 Research Advisory team discovered after they surveyed 200 respondents across North America to understand preferences and adoption trends.
Read moreLearn preferences and adoption trends with respect to multi-factor authentication in the enterprise.
Read more