Tag: passwordless


Sep 15, 2022
Thoughts on modern cybersecurity for retail and hospitality in advance of RH-ISAC’s Cyber Intelligence Summit
Recently Derek Hanson, vice president and product evangelist at Yubico, spoke with Paul Malcomb, cyber threat intelligence analyst and engagement lead at Retail and Hospitality ISAC (RH-ISAC), on their podcast. Derek shared insight on how passwordless authentication using FIDO and phishing-resistant MFA can help retail and hospitality organizations accomplish business goals such as ensuring strong …
Yubico Releases MFA Guide in Recognition of World Password(less) Day
PALO ALTO, CA and STOCKHOLM, SWEDEN – May 4, 2022 – In recognition of World Password Day, Yubico, the leading provider of hardware authentication security keys, today issued a multi-factor authentication (MFA) guide to help better define common and new industry terms, as well as the standards that are supporting modern authentication. While it is …

May 4, 2022
Making sense of the alphabet soup within authentication and modern MFA terminology
The vast majority of all cyberattacks start with stolen login passwords or other credentials. In a world that is moving to the cloud, our work, personal and government communication systems have become more accessible and vulnerable for anyone on the internet. Of all the different cyberattacks, credential phishing is by far the largest problem and …

May 3, 2022
WebAuthn implementation: What’s what, why should you care and new updates from Yubico
When it comes to WebAuthn, there’s certainly no shortage of acronyms or protocols. But what do they mean, and which ones do you need to care about? Fret not – both clarity and help are available! In this blog, we’ll share tips on how to implement WebAuthn, as well as share news about java-webauthn-server library …

Jan 11, 2022
2021: Both challenging and promising for cyber security
2021 was a challenging, yet promising year for cyber security. This past year, we saw critical infrastructure, which we may have taken for granted in the past, breached and disrupted. My father, who lives in Sweden, could not buy food in his local grocery store, and coworkers and friends on the east coast in the US …

Nov 18, 2021
In passwordless authentication, who is holding the keys?
Strong authentication practices are based on validating a number of authentication factors to a relying party (RP) or identity provider (IDP) to prove you are who the RP expects. Examples of relying parties could be Dropbox or Salesforce. Identity providers, who can also be a relying party that interacts with the authenticator, include Microsoft Azure, …