Microsoft has consistently been a pioneer and architect of digital innovations that raises the bar for what technology can accomplish – especially within cybersecurity. Their mission to empower every organization to achieve more is highlighted in advancements in new products – including today’s announcement of Surface Pro 10 for Business which prioritizes security and user […]
Read moreLearn more about the current cybersecurity landscape and how collaborations like the one between Yubico and Microsoft play a crucial role in driving the adoption of standards and technologies that raise the bar for enterprise security.
Read moreOn a daily basis, organizations around the world contend with increasingly sophisticated cyber attacks like phishing that exploit human error, leverage compromised accounts and employ convincing, yet deceptive, tactics to infiltrate corporate networks. Balancing security with a seamless user experience for their front line, employees should be a top goal forevery executive since those are […]
Read moreLearn about the six key best practices to accelerate the adoption of phishing-resistant MFA and how to ensure secure Microsoft environments.
Read moreLearn how Windows Hello for Business and YubiKeys work in concert to provide solutions for your organization and your customers.
Read moreLearn why there is a critical need for phishing-resistant MFA to support Zero Trust for Microsoft environments.
Read moreExplore how Yubico and Microsoft are revolutionizing Zero Trust cybersecurity with phishing-resistant multi-factor authentication solutions.
Read moreIn an effort to protect the nation’s infrastructure and improve cybersecurity, the Executive Order 14028 and the Office of Management and Budget Memo M-22-09 took a strong stance to require phishing-resistant authentication for all federal agencies. The M-22-09 memo also specifies two standards-based authentication protocols that will satisfy the phishing-resistant requirements, FIDO2/WebAuthn and PIV smart […]
Read moreFollowing last November’s announced public preview of Azure AD Certificate-based authentication (CBA) on iOS and Android devices using certificates on hardware security keys, we’re excited to share that it is now generally available for everyone! Be sure to check out Microsoft’s blog post detailing the general availability here for more information. As mentioned previously, CBA […]
Read morePrivileged access management is a critical identity governance component of a cybersecurity risk reduction strategy. Threat actors often target over-privileged accounts to gain unauthorized access, exfiltrate sensitive data, introduce malicious activity, or engage in other forms of malicious behavior. By employing effective privilege management tools, organizations can significantly reduce their attack surface and mitigate the […]
Read more