Tag: phishing-resistant MFA

  • Eliminating enterprise risk: One phishing-resistant user at a timePasswords are ingrained in enterprises with traditional identity lifecycle stages, which exposes them to increasingly sophisticated cyber attacks that rely on stolen login credentials for success like phishing. Phishing is one of the greatest cybersecurity risks that enterprises face – in fact, stolen passwords are one of the largest threat vectors compromising online security today […]Read morephishing-resistant MFAphishing-resistant users
  • securing federal systems solution brief featured imageSecuring federal systems integrators and the defense industrial base with modern authenticationFSIs have access to critical systems and hold large volumes of sensitive and Controlled Unclassified Information (CUI), making them targets of sophisticated cyber attacks. Any MFA is better than a password, but not all MFA is created equal. Download the visual industry brief to learn how FSIs and the DIB can protect themselves with modern, phishing-resistant multi-factor authentication (MFA).Read morefederal governmentfederal systems integratorsphishing-resistant MFA
  • Now available for purchase: YubiKey 5 Series and Security Key Series with new 5.7 firmware Earlier this month, we announced the launch of Yubico Authenticator 7 as well as the upcoming availability of YubiKey 5.7 firmware. Beginning today, we’re excited to share that YubiKey 5 Series, Security Key Series, and Security Key Series – Enterprise Edition keys purchased and shipped from Yubico will include the new firmware. Keys with the […]Read morefirmware updatephishing-resistant MFASecurity Key SeriesYubiKeyYubiKey 5YubiKey 5 Series
  • Supercharging telcos against modern cyber threats infographic cover imageSupercharging telcos against modern cyber threatsLearn why it is critical that phishing-resistant authentication be the first line of defense for telecommunication organizations.Read moremodern cyber threatsphishing-resistant MFATelecommunication
  • Unlocking the future: Navigating passkeys to passwordless security at scale webinar cover imageUnlocking the future: Navigating passkeys to passwordless security at scaleJoin this webinar to learn about the benefits of passkeys in the landscape of passwordless options, life cycle considerations for achieving a successful passwordless rollout at scale and the latest enterprise-centric updates for YubiKeys.Read morepasskeyspasswordlessphishing-resistant MFAYubiKey
  • Accelerating financial services from legacy MFA to modern passkey authentication cover imageAccelerating financial services from legacy MFA to modern passkey authenticationWatch this webinar to learn the pros and cons of different types of passkey approaches financial services institutions should consider in their move away from legacy authentication.Read morefinancial servicespasskeyspasswordlessphishing-resistant MFA
  • Meeting the Sept 2024 White House phishing-resistant MFA deadline webinar cover imageMeeting the Sept 2024 White House phishing-resistant MFA deadlineLearn best practices from government executives on their agencies’ journeys, how they navigated challenges and pitfalls to achieve compliance and what steps your agency can take right now to show intent and progress toward phishing-resistant MFA.Read morecompliancefederal governmentphishing-resistant MFA
  • Securing Federal Systems Integrators solution brief cover imageSecuring Federal Systems Integrators with modern authenticationLearn how Federal Systems Integrators (FSIs) can modernize their authentication stack and create phishing-resistant users and systems to protect against modern cyber threats.Read morecybersecurityfederal governmentphishing-resistant MFA
  • QR codes within enterprise security: Key considerations and best practicesEvery second, a phishing attack takes place. In fact, over 80% of cyber attacks are a result of stolen login credentials from attacks like phishing – mostly due to the relatively low cost and high success rate to execute these attacks. Unfortunately, this pattern will continue to grow as attackers become more sophisticated, utilizing tools […]Read morephishing-resistant MFAQR Code PhishingQuishing
  • Transform Zero Trust featured imageCISOs: Transform Zero Trust to an organization-wide priorityLearn why every CISO’s Zero Trust strategy should start with phishing-resistant MFA.Read moreCISOphishing-resistant MFAYubiKeyzero trust