The long-awaited second version of the Cybersecurity and Infrastructure Security Agency’s (CISA) Zero Trust Maturity Model (ZTMM) is here after more than a year of public comments and agency responses. The latest model points federal agencies, and all organizations that work with them, toward a Zero Trust security architecture. The White House laid the groundwork […]
Read moreLearn about strong authentication best practices that will put you on the right track to implementing your Zero Trust framework.
Read moreOn March 2, the White House made a clear and important announcement to the tech sector regarding cybersecurity efforts moving forward: “We must rebalance the responsibility to defend cyberspace by shifting the burden for cybersecurity away from individuals, small businesses, and local governments, and onto the organizations that are most capable and best-positioned to reduce […]
Read moreLearn how you can meet Zero Trust and phishing-resistant MFA per EO 14028 and OMB M-22-09 mandates with the DOD-approved and FIPS 140-2 validated YubiKey.
Read moreLast year, we anticipated that 2022 would be challenging for cybersecurity. This was proven true with the countless number of sophisticated high-profile phishing and ransomware attacks like DropBox, Twitter, Rockstar Games and Uber (twice). With the introduction of phishing-as-a-service and other sophisticated toolkits that target weaker forms of 2FA, security teams are now prioritizing phishing […]
Read moreLearn how physical security keys played a crucial role in not allowing Cloudflare to be another victim in a widespread phishing attack.
Read moreLearn how these new features combined with a YubiKey should be an integral part of your Zero Trust strategy.
Read moreMicrosoft recently announced the release of three new solutions that enable organizations to deploy Azure Active Directory (Azure AD) to fight phishing attacks in Azure, Office 365, and remote desktop environments. These solutions will be essential to mitigate phishing attacks and will play a key role in supporting organizations looking to comply with the Executive […]
Read moreCome learn key differences between PKI and FIDO, how to deploy FIDO within federal security policies, how to deploy FIDO within federal security policies, and more.
Read moreJoin Yubico and Okta on September 22nd to learn how YubiKey, combined with Okta Adaptive MFA, work together to provide modern phishing-resistant MFA as well as a simplified user experience for the strongest levels of protection.
Read more