To continue our effort to peel back the layers on the journey to passwordless, Yubico talked with former Navy intelligence officer and University of Tulsa professor, Sal Aurigemma, about his research in the behavioral information security field. Professor Aurigemma focuses on end-user experiences and adoption rates of authentication technologies. He regularly runs field experiments with […]
Read morePingID and YubiKey together comprise a modern MFA solution.
Read moreThe YubiKey and Okta Adaptive MFA provide the strongest level of identity assurance and defense against phishing and man-in-the-middle attacks, while also delivering a simple and seamless user experience
Read moreYubiKeys coupled with Duo MFA provide an easily understood, secure solution.
Read moreIdentity and Access Management Identity and Access Management (often abbreviated IAM) is a combination of technologies, techniques, and policies employed by companies to manage conditional user access across elements of their tech stack. The form IAM takes can vary widely across different enterprises, but the two primary objectives of Identity and Access Management are undeniably […]
Read moreImproved usability Use of a hardware-based security key is fast and easy. For FIDO2 supported services, users are freed from having to remember and type passwords. Strong account security Replaces weak passwords with strong hardware-based authentication using Private / Public Key (asymmetric) cryptography. One key to all accounts A single security key that can work […]
Read moreWhat is multi-factor authentication? Multi-factor authentication (MFA) can greatly enhance security while delivering a positive user experience. MFA is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence, or factors, to an authentication mechanism. * The 2019 State of Password and Authentication Security […]
Read moreStop account takeovers while enhancing customer experience The high availability of sensitive data including payment card information (PCI) and employee and customer personal identifiable information (PII), makes retail and hospitality organizations a lucrative target for cyberattacks including phishing, ransomware, and data theft. A core part of a strong Zero Trust cybersecurity approach is multi-factor authentication […]
Read moreNot all MFA is created equal While MFA can be a strong first-line of defense, not all forms of multi-factor authentication (MFA) are created equal. Legacy authentication such as usernames and passwords can be easily hacked, and mobile-based authentication such as SMS, OTP codes, and push notifications are highly susceptible to modern phishing attacks, malware, […]
Read moreYubiKeys plus Cisco’s Duo Security MFA provide an easily understood, implemented, and managed solution.
Read more