How does an HSM work? An HSM is a secure physical device, typically plugged into a computer, that is used to protect cryptographic keys. HSM’s offer a tamper resistant environment to host a larger number of keys. By providing a centralized place for key management the process is streamlined and secure. You may notice the […]
Read moreWhat is the YubiHSM 2? The YubiHSM 2 is a Hardware Security Module that provides advanced cryptography, including hashing, asymmetric and symmetric key cryptography, to protect the cryptographic keys that secure critical applications, identities, and sensitive data in an enterprise for certificate authorities, databases, code signing and more. For more information see the YubiHSM 2 Product […]
Read moreToday, I am excited to share that we have added yet another stellar member to the Yubico leadership team: Wendy Spies. Wendy comes from Microsoft where she most recently directed engineering strategy and business development for cloud and AI to build new products and markets. She will be focusing on similar things here at Yubico […]
Read moreWe are excited to announce that Amazon Web Service (AWS) Internet of Things (IoT) Greengrass users can now use Yubico’s hardware security module, the YubiHSM 2, Yubico’s ultra-portable hardware security module, for secure key storage. AWS IoT Greengrass software provides local compute, messaging, and data caching for the IoT devices, enabling users to run IoT […]
Read moreOne of the most important facets of enterprise security is ensuring protection for all employee accounts. Password sharing methods play a critical role. When pressed for time, many users resort to sending unencrypted plain-text passwords via high risk channels like chat or email. There are other ways to securely share passwords across teams throughout an […]
Read moreThe YubiHSM 2 differs from traditional HSM models — historically limited in use by cost, size, and performance — by offering advanced digital key protection capabilities and benefits at a price within reach for all organizations. Delivered in an ultra-slim “nano” form factor, the YubiHSM 2 fits inside a USB port, eliminating the need […]
Read moreDepending on the numbers you consult, there are nearly three billion people on the internet, mostly protected by usernames and passwords, and nearly 100 million servers with limited or no protection. They are joined by an untold number of hackers feasting on this reality. This week, Yubico took on that scenario in a live webinar […]
Read moreU.S. intelligence officials in 2013 said they planned to significantly reduce the number of individuals within their network with system administrator privileges. Those privileges gave administrators rights to view and move around any document. “U.S. intelligence has invited so many people into the secret realm,” an official told NBC News, that it left the organization overly exposed to threats […]
Read more