Boliden is one of Europe’s leading metal mining companies. Based in Sweden, with presence around the Nordic region and beyond, Boliden produces a vast array of the metals required for modern life: zinc, copper, lead, nickel, gold, palladium, platinum and silver.
Read moreResponding to the growing cybersecurity threat Shaun Tosler, Infrastructure Manager at Phoenix, works closely with the Phoenix CTO and Bytes Technology Group CISO to look after all IT infrastructure internally and those that run managed services. His challenge is to maintain a high-level of security while ensuring ease of access and usability for both their […]
Read moreMore than 20,000 customers trust BeyondTrust with Internet Access Management. As a security company themselves, BeyondTrust takes their brand reputation and internal security seriously, and have invested in strong MFA from a partner like Yubico. The case study walks through how BeyondTrust has increased their security posture with a phased rollout of YubiKeys and has not only strengthened their cybersecurity defenses, but have done it in a predictable and efficient way with YubiEnterprise Subscription and YubiEnterprise Delivery services.
Read moreLearn why securing privileged users and accounts with phishing-resistant multi-factor authentication (MFA) is a critical need across the industry.
Read moreIn an era of increasing cyber attacks, how do you balance the desire for unrestricted research freedom against the need to protect that research from cyber threats? This is the challenge faced by CERN, leaders in the scientific research community. Their solution? Provide a clear articulation of what constitutes privileged data, and create flexible security […]
Read moreStep one in any effective cyber security program includes securing privileged accounts, credentials, and secrets with modern strong authentication. Download the Yubico White Paper, The critical strong authentication need for privileged users, to learn who really is a privileged user, and industry best practices to secure your privileged users against phishing attacks and account takeovers.
Read moreDeploy phishing-resistant authentication to protect privileged users and your organization against modern cyber threats.
Read moreZero account takeovers with the YubiKey Privileged users are the most highly targeted users by cyber attackers as these users hold higher ‘privileges’ to critical and sensitive applications and data. These could be IT, security, network and database admins, as well as C-suite, HR, finance and marketing employees. Securing privileged users across both IT and business […]
Read moreHow can you prove you are who you say you are?
Read more