Tag: mobile authentication
-
Think “good enough” is enough? Think again about mobile devices as authenticators Explore the hidden costs and pitfalls of using mobile devices as authenticators. We’ll dive into critical factors such as the user lifecycle, security, phishing resistance, user experience, management, and total cost of ownership. Read more -
The dark side of mobile authentication Modern cyber threats are increasing in scale so ensuring strong security for access to enterprise applications and services is a critical need across all industries. Join this webinar to learn the top 5 mobile authentication misconceptions and much more! Read more -
The dark side of your mobile authentication strategy Learn the key misconceptions related to mobile-based MFA that are putting your organization at risk of being hacked. Read more -
Prevent phishing with Azure AD CBA and YubiKeys on mobile devices In this webinar, you’ll hear how Yubico is working closely with Microsoft on its CBA mobile solutions to play a critical part in the fight against phishing. The companies are working together to support organizations to provide consistent and strong phishing-resistance across all platforms Read more -
Not all MFA is created equal: Mobile MFA lures cybercriminals Legacy MFA such as mobile authentication is highly vulnerable to phishing and other forms of account takeovers. Learn about the pitfalls of mobile MFA and best practices to stop account takeovers. Read more -
Security considerations for the top 8 mobile device-restricted workplaces When looking at enterprises and organizations, there are many different business scenarios that can be present when addressing secure authentication. Whether those be shared workstations, remote workers, or even privileged accounts, there is one in particular that introduces its own difficulties: mobile device-restricted workplaces. It’s safe to say that there will always be workplaces which, […] Read more -
A Day in the Life: Dispelling the Myths of Mobile Authentication COVID-19 initiated the most rapid digital transformation ever witnessed—organizations fast-tracked two-factor and multi-factor authentication to transition millions of employees to work from home. But with remote and hybrid work likely to continue in 2022 and beyond, it’s time to step back and ask: is my in-use authentication as secure as I think it is? Is […] Read more -
The top 5 mobile authentication misconceptions – Yubico Download the Yubico White Paper, The top 5 mobile authentication misconceptions to learn the key misconceptions related to mobile-based MFA that are a ticking time bomb, and putting organizations at risk. Read more -
Modern Authentication for the Federal Government – Yubico Learn how DOD approved hardware security keys such as the YubiKey are ideal to fill PIV and CAC related authentication gaps across the federal government, and meet the MFA mandate in the Biden Executive Order 14028. Read more -
Software Development Toolkits (SDKs) How it works Yubico’s range of SDKs equip developers with the tools needed to quickly and efficiently integrate hardware-based strong authentication support into the apps that are being built. Develop apps that users love and provide a seamless and consistent login experience for customers and employees, regardless of their device. What our customers and partners […] Read more