Archive
Stay up to date on company and partner news, product tips, and industry trends.
-
Safeguard IT/OT Ecosystems
Join us to hear from thought leaders at Schneider Electric and Yubico as they discuss the role of phishing-resistant authentication and hardware-backed security using Zero Trust principles across your company and supply chain.
Read more -
CISA’s new Zero Trust Maturity Model gives MFA a push – Yubico
The long-awaited second version of the Cybersecurity and Infrastructure Security Agency’s (CISA) Zero Trust Maturity Model (ZTMM) is here after more than a year of public comments and agency responses. The latest model points federal agencies, and all organizations that work with them, toward a Zero Trust security architecture. The White House laid the groundwork […]
Read more -
Accelerate Your Zero Trust Strategy with Strong Authentication: Seven best practices to jumpstart your journey
Learn about strong authentication best practices that will put you on the right track to implementing your Zero Trust framework.
Read more -
The White House’s National Cybersecurity Strategy and Pandemic Anti-Fraud Proposal: Three things you should do to respond now
On March 2, the White House made a clear and important announcement to the tech sector regarding cybersecurity efforts moving forward: “We must rebalance the responsibility to defend cyberspace by shifting the burden for cybersecurity away from individuals, small businesses, and local governments, and onto the organizations that are most capable and best-positioned to reduce […]
Read more -
Phishing-resistant MFA for Federal Government
Learn how you can meet Zero Trust and phishing-resistant MFA per EO 14028 and OMB M-22-09 mandates with the DOD-approved and FIPS 140-2 validated YubiKey.
Read more -
Forging ahead: A CISOs top recommendations to stay secure in 2023
Last year, we anticipated that 2022 would be challenging for cybersecurity. This was proven true with the countless number of sophisticated high-profile phishing and ransomware attacks like DropBox, Twitter, Rockstar Games and Uber (twice). With the introduction of phishing-as-a-service and other sophisticated toolkits that target weaker forms of 2FA, security teams are now prioritizing phishing […]
Read more -
Widespread SMS phishing attack thwarted with Cloudflare Zero Trust and YubiKeys
Learn how physical security keys played a crucial role in not allowing Cloudflare to be another victim in a widespread phishing attack.
Read more -
New tools to prevent phishing with Azure AD and YubiKeys
Learn how these new features combined with a YubiKey should be an integral part of your Zero Trust strategy.
Read more -
Phishing-resistant MFA available now with Azure AD and YubiKeys
Microsoft recently announced the release of three new solutions that enable organizations to deploy Azure Active Directory (Azure AD) to fight phishing attacks in Azure, Office 365, and remote desktop environments. These solutions will be essential to mitigate phishing attacks and will play a key role in supporting organizations looking to comply with the Executive […]
Read more -
The importance of hybrid authentication in zero trust architectures
Come learn key differences between PKI and FIDO, how to deploy FIDO within federal security policies, how to deploy FIDO within federal security policies, and more.
Read more