Tag: security

Thumbnail

Accelerate YubiKey adoption at scale

Learn deployment best practices to enhance your security posture with phishing-resistant MFA

Thumbnail

Protecting manufacturing with highest-assurance security

Learn how to secure manufacturing organizations and the importance of strong security and phishing-resistant MFA.

Thumbnail

Arvika Municipality enhances security and undergoes digital transformation in Education with YubiKeys

Learn how Arvika was able to provide an easy-to-use cloud environment for all its data and information, protected by YubiKey’s strong multi-factor authentication.

Thumbnail

Best Practices to Secure SMBs in an Evolving Cyberthreat Landscape

Learn how the YubiKey offers phishing-resistant MFA to stop account takeovers, reduce costs, and drive employee productivity

Thumbnail

Securing America’s Supply Chain

Learn best practices for the federal government and the energy sector as they modernize security across critical infrastructure and their supply chains.

Thumbnail

Hybrid work driven by Covid-19 prompts a shift in financial services security priorities

All industries are dealing with the thorny issue of who comes back to work during the pandemic and who doesn’t, and the return-to-work plans will diverge depending on each enterprise’s needs and culture. But banks, financial institutions, and many other players in the financial services industry are paying close attention to the security perils of

Thumbnail

Jul 19, 2021

People matter: How to solve security skills shortage challenges

The skills shortage in the security industry stretches as far back as we can remember having an industry. Everyone knows it’s a challenge with no easy short-term solutions. The root of the security skills shortage gap remains murky, and some observers say the pandemic and reallocations of security resources could be widening that gap. The

What is IP Spoofing?

How does IP spoofing work? To break things down, IP (Internet Protocol) packets house information like IP addresses and the destination IP addresses. IP addresses allow computers to send and receive information, when connected to wi-fi. Hackers operate spoofing attacks by changing the source address in the packet header to make the destination think someone

What is IAM (Identity and access management)?

Why do we need identity and access management? The whole reason organizations use identity and access management is for cybersecurity. IAM promotes cybersecurity by being a gatekeeper. When an employee is logging in to a system, IAM is figuring out the identity of the person trying to login and the privileges each identity is able

Thumbnail

Doing the Math: Why strong authentication for every employee makes sense

By now, it’s an all-too-familiar routine… Step 1: Organization suffers an expensive and embarrassing security breach.  Step 2: Organization hastily introduces multi-factor authentication (or steps up its efforts to mandate its usage).  Oftentimes, it takes a breach to make organizations fully embrace strong authentication. But why? We know that usernames and passwords alone cannot provide sufficient security, and we know that SMS two-factor authentication (2FA) has been deprecated time