Tag: YubiHSM 2
-
YubiHSM 2 (v2.4) expands to include simplified and secure backups and ‘Bring Your Own Key’ support As the rate and complexity of credential theft and phishing attacks on enterprises continue to increase rapidly, so do the number of server-based attacks. YubiHSM 2, the leading nano-form factor hardware security module (HSM), offers organizations superior protection from these attacks for sensitive data against theft and misuse. The new YubiHSM 2 (v2.4) – officially […] Read more BYOK YubiHSM YubiHSM 2 -
YubiHSM 2’s ‘Bring Your Own Key’ is portable security for cloud Creating a robust data encryption strategy in a multi-cloud environment can be challenging. Considerations like availability, fail-over, control, cost and compliance are crucial. For organizations that are encrypting data on-premises and considering moving data to the cloud, a typical approach is to use an on-premises Hardware Security Module (HSM) or a cloud-based HSM. However, acquiring […] Read more BYOK YubiHSM 2 -
YubiHSM 2, the world’s smallest hardware security module, enhanced with new features to support security for the Public Sector Compliance mandates require many of our customers in regulated industries or in high-risk environments to prove adequate levels of protection for their data, no matter where it lives or travels. This is why we’ve continued to enhance the capabilities of both the YubiHSM 2 and YubiHSM 2 FIPS, the world’s smallest FIPS-validated and non-FIPS hardware […] Read more FIPS 140-2 Public Sector YubiHSM YubiHSM 2 -
boeing-customer-offer Boeing has identified the Yubico YubiHSM 2 as a USB Hardware Security Module (HSM) device that will meet key and certificate management requirements identified in ATA Spec 42, Level 4. Read more cryptography YubiHSM YubiHSM 2 -
What SolarWinds taught us about the importance of a secure code signing system Last year’s SolarWinds attack was caused by intruders who managed to inject Sunspot malware into the software supply chain. The hackers exploited a breach in the SolarWinds code signing system, which allowed them to fraudulently distribute malicious code as legitimate updates to installations across the world. While this attack taught the industry many lessons, one […] Read more data breach developers Yubico Developer Program YubiHSM YubiHSM 2 -
YubiKey firmware update: YubiKey 5 Series with firmware 5.4 As of today, Yubico will start shipping the YubiKey 5 Series with firmware 5.4. This new firmware release will enable easier integration with Credential Management System (CMS) solutions, secure remote provisioning of YubiKeys, and expanded methods for PIV management. Key benefits of the YubiKey Firmware Update for the YubiKey 5 Series with 5.4 firmware include: […] Read more YubiHSM 2 YubiKey 5 -
A Yubico first…introducing the YubiHSM 2 FIPS Compliance mandates require many of our customers in regulated industries or in high-risk environments to prove adequate levels of protection for their data, no matter where it lives or travels. This is why today we’ve not only launched the YubiKey 5 FIPS Series but also the smallest FIPS-validated hardware security module (HSM) in the world, […] Read more compliance FIPS 140-2 YubiHSM 2 -
YubiHSM2 product brief YubiHSM 2 ensures uncompromised cryptographic hardware security for applications, servers and computing devices. Read more YubiHSM YubiHSM 2 -
Modernize security across manufacturing In order to protect against modern cyber attacks on critical infrastructure and the software supply chain, security solutions need to modernize. Learn how to implement phishing-resistant MFA and safeguard the supply chain with Yubico solutions. Read more manufacturing modern authentication phishing-resistant MFA supply chain YubiHSM 2 YubiKey -
YubiHSM 2 libraries and tools What is the YubiHSM 2? The YubiHSM 2 is a Hardware Security Module that provides advanced cryptography, including hashing, asymmetric and symmetric key cryptography, to protect the cryptographic keys that secure critical applications, identities, and sensitive data in an enterprise for certificate authorities, databases, code signing and more. For more information see the YubiHSM 2 Product […] Read more YubiHSM YubiHSM 2
1
2
Next Page