Tag: passkey
-
How to create phishing-resistant users with fast, out-of-the box YubiKey FIDO activation with Okta Get started on building phishing-resistant security with Yubico FIDO Pre-reg and Okta! For a successful YubiKey deployment, download the guide. This resource outlines a six-step process covering planning, validation, integration, launch, adoption, and success measurement—providing essential strategies to help organizations enhance security and operational efficiency with phishing-resistant MFA. Read more Okta passkey passwordless phishing-resistant MFA -
2024 Gartner® Hype Cycle™ for Digital Identity Learn about the growing adoption in FIDO and the business impact and different tradeoffs for device-bound passkeys and multidevice passkeys. See how modern authentication and the most secure device-bound passkeys from Yubico fit in the overall hype cycle of developing identity protection technologies. Read more account takeovers passkey passwordless phishing-resistant MFA zero trust -
New FIDO Alliance Design Guidelines: Key takeaways for passkeys and a phishing-resistant user future The FIDO Alliance is an open industry association launched in 2013 whose mission is to develop and promote authentication standards that help reduce the world’s over-reliance on passwords. Yubico has pioneered the development of FIDO authentication standards that the FIDO Alliance has adopted, working to make the internet safer for all. First published in 2022, […] Read more FIDO Alliance passkey phishing-resistant users UX -
Red Hat Enterprise Linux 9.4 adds passkey support for centrally managed users, including YubiKeys As a market leader for open source software products, Red Hat is renowned for helping organizations address modern challenges to technology and cybersecurity trends through innovative solutions that meet evolving demands. Specifically, their perpetual dedication to robust security and authentication standards ensures users, enterprises and agencies can carefully monitor and regulate access to their environments […] Read more Linux passkey Red Hat YubiKey -
Five tips to maximize your consumer-facing passkey implementation Passkeys have taken the online security world by storm since their inception in mid-2022, even if the underlying technology can technically be traced back to FIDO2 and its breakthrough onto the world stage in 2018. Popularity has no doubt exploded due to their widespread adoption by the world’s largest tech companies – who also happen […] Read more best practices FIDO2 passkey -
Enterprise passkey implementations: Key considerations and tradeoffs Join this webinar to learn more about the different types of passkey implementations and gain an understanding of real life enterprise scenarios. Read more Enterprise passkey -
Passkeys for your Enterprise? Key considerations for success Join our webinar to learn about common enterprise scenarios where synced passkeys may create some chilling failure points, and other more effective and secure passkey alternatives that put your business in the best security and compliance posture. Read more Enterprise MFA passkey -
What the Authn? How Passkeys Offer a Fresh Take to Authentication Dilemmas Join our webinar to learn everything you need to know about passkeys and how you can utilize passkey technology to protect your business. Read more passkey -
NIST SP 800-63-4: What the new phishing-resistant definition means for federal agencies The recent drafts from National Institute of Standards and Technology (NIST) around cybersecurity highlight important updates on where the government is moving on technology and the focus on increasing security against cyber threats. This is because NIST’s primary goal is to develop and disseminate the standards that allow technology to work seamlessly and businesses to […] Read more federal government NIST NIST SP 800-63-4 passkey -
Considering Passkeys for your Enterprise? Avoid common pitfalls of synced passkeys Navigating the new passkey landscape? Read the ebook to learn about synced passkeys that are copyable versus device-bound passkeys, and how synced passkeys can create some failure points in the enterprise. Read more Enterprise passkey passwordless
1
2
Next Page