We’ve heard from customers and Yubico employees that have experienced first hand how difficult it can be for government employees to remotely and securely access essential web services like email, MyPay, and Defense Travel System. In the past, they would typically be required to login to a desktop, making access on the go essentially impossible. […]
Read moreSANTA CLARA, CA, STOCKHOLM, SWEDEN and TULSA, OK – July 15th 2024 – Yubico, the leading provider of hardware authentication security keys and Straxis, a mobile application provider, today announced the availability of a new Secure Web browsing application called MilSecure Mobile. This application can be adopted by any Defense Department (DOD) organization to enable […]
Read moreAs the threat of sophisticated attacks like phishing continue to rise, enterprise users and cybersecurity teams are seeking a solution that offers robust security and user-friendly functionality. With the increasing adoption of biometric logins, enterprises aim to marry strong security with user convenience to boost productivity and job satisfaction. Hardware security keys that leverage biometrics, […]
Read moreEvery November, Critical Infrastructure Security and Resilience (CISR) Month focuses on educating the vital role critical infrastructure plays in the nation’s well being. Led by Cybersecurity and Infrastructure Security Agency (CISA), the conversation centers around why it’s important to strengthen critical infrastructure security and resilience. One of the critical infrastructures, energy and natural resources, is […]
Read moreIn a recent post we discussed the concept of using a YubiKey as a smart card on iOS. Now that we’ve outlined the overall concept, we’d like to expand by exploring the unlocked use cases for using a smart card for authentication, creating digital signatures, and decrypting messages and documents on Apple iPhones and iPads. […]
Read moreLegacy multi-factor authentication (MFA) has not worked against modern cyber threats due to inability to stop phishing and other account takeovers. Modern MFA, such as YubiKeys, have been proven to stop phishing attacks and account takeovers in their tracks. Only solutions based on Smart card/PIV or FIDO protocols are truly phishing-resistant according to the National […]
Read moreIn previous blog posts here and here, we’ve shared how you can use a YubiKey and its PIV Smart Card application together with the Yubico Authenticator app for iOS. Essentially, you can now use your YubiKey to authenticate in Safari and many other applications on iOS using certificate-based authentication backed by the PIV Smart Card […]
Read moreSmartcards provide strong security but they can be complex for to adopt both for the organization and the end users alike. Users may even have to carry smart card readers and additional peripherals to use the solution. Read this solution to understand how a modern and simplified smart card approach can either replace your legacy smart card approach, or get you on the road to raising the security bar, by providing strong phishing defense in the modern cyber threat landscape. All while being very well suited for your hybrid or remote workforce, with users working across a range of modern desktops, tablets and smart phones.
Read moreSmart cards, while they provide strong security, can be complex for to adopt both for the organization and the end users alike. Users may even have to carry smart card readers and additional peripherals to use the solution. Read this solution to understand how a modern and simplified smart card approach can augment your existing smart card strategy and provide strong phishing defense in the modern cyber threat landscape. All while being very well suited for your hybrid or remote workforce, with users working across a range of modern desktops, tablets and smart phones.
Read moreEntities within the US Federal Government are in the midst of a drastic change regarding how they approach the services they are using—moving away from traditional on-prem and proprietary systems to cloud services based on private platforms, like Azure and Amazon Web Services. However, the requirements for security remain the same regardless of the platform […]
Read more