Tag: zero trust

Home » zero trust
  • Remaining cyber resilient: Top recommendations for 2025 webinar cover imageRemaining cyber resilient: Top recommendations for 2025With 2024 soon to be in the rear view mirror, prepare for a safe 2025 by attending this webinar to learn what organizations and individuals should be prioritizing to become phishing-resistant users and become cyber resilient against an ever evolving cyber threat landscape.Read morecyber resiliencepasswordlessphishing-resistant MFAzero trust
  • Securing critical infrastructure from modern cyber threats with phishing-resistant authenticationAcross the globe, 2024 has seen a whirlwind of change. With ongoing wars, recent political change-ups and more, growth in data breaches targeting critical infrastructure continue to be on the rise. Critical infrastructure is integral to our everyday life – from the energy and natural resources powering our hospitals and providing clean drinking water, telco […]Read moreCISAcritical infrastructurezero trust
  • Yubico LogoWhat is a Zero Trust Framework?The term zero trust (ZT) or zero trust network access (ZTNA) refers to a comprehensive security approach and framework that fundamentally redefines the traditional notion of trust in network security.Read morezero trustzero trust framework
  • Securing America’s future: Implementing M-22-09 by the 2024 deadlineZero Trust Architecture (ZTA) represents a paradigm shift in cybersecurity strategy, moving away from the traditional perimeter-based security model to one that assumes no implicit trust, even within the network. In compliance with Executive Order 14028 to improve the nation’s cybersecurity, the Office of Management and Budget (OMB) released M-22-09  mandating all federal agencies to […]Read moreExecutive OrderOMB Memo-22-09phishing-resistant MFAzero trust
  • Operational Technology (OT) security: Key risks and mitigation strategies to achieve phishing-resistanceOperational Technology (OT) is a critical component of several industries as it powers the systems that control the distribution of power, water and other utilities, drives the machinery that powers manufacturing, and controls everything from traffic lights to tanker ships. With the OT space under constant threat from cyber attacks, it’s more important than ever […]Read moreOperational TechnologyOTzero trust
  • Modern authentication for the ArmyDownload the free brochure to learn how the YubiKey solves U.S. Army authentication modernization use cases.Read moremodern authenticationYubiKeyzero trust
  • Transform Zero Trust featured imageCISOs: Transform Zero Trust to an organization-wide priorityLearn why every CISO’s Zero Trust strategy should start with phishing-resistant MFA.Read moreCISOphishing-resistant MFAYubiKeyzero trust
  • Securing critical infrastructure white paper cover imageSecuring the world’s critical infrastructure against modern cyber threatsLearn how to safeguard IT/OT systems and the supply chain with Zero Trust using phishing-resistant MFA and hardware-backed security. Read morecritical infrastructurephishing-resistant MFAzero trust
  • How businesses can protect the identities of its leaders and employees from the perils of rising sophisticated cyber attacksOn a daily basis, organizations around the world contend with increasingly sophisticated cyber attacks like phishing that exploit human error, leverage compromised accounts and employ convincing, yet deceptive, tactics to infiltrate corporate networks. Balancing security with a seamless user experience for their front line, employees should be a top goal forevery executive since those are […]Read moreC-SuiteFIDO2Microsoftphishing-resistant MFAzero trust