What does it mean to be FIPS 140-2 Certified/Validated? To be FIPS 140-2 certified or validated, the software (and hardware) must be independently validated by one of 13 NIST specified laboratories, this process can take weeks. The FIPS 140-2 validation process examines the cryptographic modules. Level 1 examines the algorithms used in the cryptographic component […]
Read moreWhat is two-factor authentication? Two-factor authentication (also known as 2FA or two-step verification) is a method to confirm a user’s claimed online identity by using a combination of two different types of factors. A password is typically considered one factor, and with 2FA that is combined with another factor to increase login security. Factors used […]
Read moreThe internet is a powerful invention. It was originally built for collaboration, but it’s far surpassed the capabilities anyone could have expected, and has become a core function of society. As developers, we contribute to these incredible advancements every day, but it’s also our job to help protect and preserve the future of the internet. […]
Read moreJoin Entrust Datacard, RSA, Secret Double Octopus, and Yubico for a talk on security strategies.
Read moreThe workplace is evolving and expanding well beyond the four walls of a corporate office, and with this expansion comes new questions about how to secure employee login. In 2019, fifty-one percent (51%) of IT professionals said their organization experienced a phishing attack, making it dire for organizations to identify solutions that employees can use […]
Read moreRecently, remote access has become the new way of working for many businesses and our team at Yubico has also had to adapt to this new reality. Last week, we published the first entry in our remote working blog series: 5 ways the YubiKey can protect your remote workforce from phishing and other attacks. Now, […]
Read moreAs National Cybersecurity Awareness Month comes to an end, our focus turns to what the developer community can do to stay cyber smart all year long. We’ve already talked about access management, and shared tips on how to protect your personal accounts. Today, we offer tips from the Yubico Developer Team to developers looking to […]
Read moreIn conjunction with Data Privacy Day, Yubico is releasing today new research in a report entitled, The 2019 State of Password and Authentication Security Behaviors Report, conducted by Ponemon Institute. The findings reveal that despite a growing understanding of security best practices, user behavior is still falling short. The problem? Passwords continue to trip up […]
Read moreThere are a growing number of security breaches happening daily to individuals and businesses.
Read moreIf you caught this month’s earlier blog, you’ll know that Yubico is partnering with the National Cybersecurity Alliance to support Data Privacy Day, which takes place on January 28. Protecting privacy is one of the main end goals of a security program. It’s incredibly important to us at Yubico to empower and educate individuals and […]
Read more