Election security is an increasing concern. One Northeastern state adopted mfa using hardware security keys to protect its voters
Read moreOver the last two years, students, faculty and administrators of academic and educational institutions have faced many challenges, including jumping between in-person and remote learning. With the introduction of new and shared devices to accommodate these ever-changing environments, hackers quickly took advantage of the gaps in account security that hadn’t yet been accounted for, which […]
Read moreThe tragic events in Ukraine have forced neighboring states to suddenly reevaluate their defense policies. Finland, which shares over 1000km of border with Russia, is on high-alert while in recent months ordinary Swedes have rushed to join the Hemvärnet, Sweden’s military’s reserve force, in record numbers. Most notably, the threat of Russian attack has convinced […]
Read moreWe’re excited to be back for the milestone 25th year of Black Hat USA, and are looking forward to seeing everyone both in-person in Las Vegas and virtually for the hybrid event from August 10-11! Attending in person? Come visit us at booth #1699 to see live demos of the YubiKey and talk with us […]
Read moreThe education sector currently faces the highest volume of cyberattacks of any sector, with 60% of educational institutions (higher and lower) suffering ransomware attacks in 2021. Cyberattacks are a source of significant cost and can cause major disruption to school operations, which was the case of the recent attacks at UMass and Baltimore County Public […]
Read moreLearn how Yubico solutions such as the YubiKey and YubiHSM 2 can help you secure your software supply chain, ensure IP security and product integrity, and provide highest-assurance security for third party access to critical systems and data.
Read moreAttend this webinar to learn the key security best practices to secure mobile-restricted environments.
Read moreLearn the critical need for phishing-resistant multi-factor authentication to safeguard this critical infrastructure and authentication best practices to close the critical threat gap that emerges from legacy authentication.
Read moreThe world of cybersecurity continues changing rapidly. This has been catalyzed by the sudden shift to remote work, the increasing threat of cybercrime and the complexity of attacks. Understanding the new technological landscape, and what comes next, can be challenging. Hearing from experts who spend their daily lives not only thinking about and facing these […]
Read moreLearn how state and local governments and higher education can drive 100 percent MFA coverage to protect against phishing and account takeovers
Read more