Cyber insurance requirements raise the security bar
Critical role of phishing-resistant MFA to position you well to secure coverage now and into the future


The cyberthreat landscape has always been worrisome, but recent news reports show a sharp growth in highly sophisticated cyber attacks of various kinds, from nation states and other bad actors. Ransomware attacks and other forms of account compromise continue to grace the news every month costing companies billions in downtime and lost opportunity. And in keeping with frequent and large payouts, cyber insurance companies have raised premiums by as much as 150-300%, and requiring organizations looking to purchase cyber insurance coverage to raise their bar for security. Read this solution brief to learn about the changing landscape and requirements, and how to protect your business and users with phishing-resistant multi-factor authentication (MFA).
Recommended Posts
Laying the groundwork for continuous authentication
Continuous authentication is an emerging concept—a future ‘nirvana’ state of security that would provide the capability to validate a user’s identity in real-time as they maneuver between systems, applications, and devices. In theory, continuous authentication solutions would use risk signals from a variety of monitoring sources to authenticate users, identify potential threats and proactively remediate …
Making sense of the alphabet soup within authentication and modern MFA terminology
The vast majority of all cyberattacks start with stolen login passwords or other credentials. In a world that is moving to the cloud, our work, personal and government communication systems have become more accessible and vulnerable for anyone on the internet. Of all the different cyberattacks, credential phishing is by far the largest problem and …
WebAuthn implementation: What’s what, why should you care and new updates from Yubico
When it comes to WebAuthn, there’s certainly no shortage of acronyms or protocols. But what do they mean, and which ones do you need to care about? Fret not – both clarity and help are available! In this blog, we’ll share tips on how to implement WebAuthn, as well as share news about java-webauthn-server library …
YubiKeys protecting critical IT infrastructure in Ukraine
The Russian invasion of Ukraine is a battle in both the physical and the digital world. On both sides, information warfare plays a more critical part of the battlefield than any other war in human history, with the biggest attack vector and threat being weak login credentials. According to a Ukraine cybersecurity executive at a …