Tag: strong authentication
-
How to best protect your mobile-restricted environment Learn how to best protect your mobile-restricted environment and why YubiKeys are an ideal solution. Read more -
How State and Local Governments Combat Account Takeovers Read how state and local governments are securing workers, election infrastructure, and digital services using the YubiKey for strong authentication Read more -
Modern strong authentication for online banking | Yubico Learn how modern and secure authentication using FIDO open standards used by banks such as Morgan Stanley, Vanguard, and Bank of America, can drive competitive differentiation in the financial sector. Read more -
Combat Ransomware: Strong authentication best practices Organizations are increasingly becoming victims of ransomware attacks. And this had long been foreshadowed with experts having estimated earlier that a ransomware attack will occur every 11 seconds in 2021*. When it comes to ransomware it’s not a question of if your organization will be targeted, but when. Ransomware and its connection to strong authentication […] Read more -
Why mobile authentication just isn’t good enough – Yubico Learn best practices to protect against enterprise-wide identity phishing and why mobile authentication just isn’t good enough. Read more -
Phishing-resistant authentication and compliance for healthcare organizations: How the YubiKey helps Healthcare Organizations meet regulatory requirements Read the white paper to learn how the YubiKey helps healthcare organizations ensure strong authentication and regulatory compliance Read more -
How the YubiKey meets global Financial Services regulations Read this white paper to learn how strong authentication using the YubiKey can help financial institutions stay protected against cyber attacks, and meet regulatory compliance for FFIEC, PCI DSS, GLBA, PSD2, eIDAS, SOX, SOC2, GDPR, and more. Read more -
What is Strong Authentication Strong Authentication Definition Strong authentication confirms user identity reliably and safely, never solely based on shared secrets/symmetric keys such as passwords, codes, and recovery questions. Strong authentication assumes credential phishing and impersonation attacks are inevitable and robustly repels them. Although multi-factor authentication (MFA) remains among the best ways to establish who trusted users are, actual […] Read more -
How will authentication standards evolve in 2021 and beyond? Authentication standards development is like a slow-moving, winding river. It often takes years of dedicated work to reach new milestones, yet it feeds the entire security ecosystem and sustains digital workflow safety throughout the enterprise. While the benefits of this river are often invisible to the end-user, CISOs and developers are thinking about the river’s […] Read more -
Strong multi-factor authentication for first responders How the YubiKey ensures secure, simple, and portable access for first responders to Criminal Justice Information Services (CJIS) systems Read more