Osterman Research Cyber Security in Education

1 minute read
Share this article:

Recommended content

Identify Yourself: Cyber threat protection strategies in state and local government

Lessons learned from 2020 that can inform cybersecurity planning in the years ahead.

YubiKey for the Essential Eight brief

How a YubiKey solution complies with the mitigation strategy to limit the extent of cyber security incidents.

4 things ‘Among Us’ can teach security professionals about authentication

You’re making good progress on this task. One more data upload and then you’re out of here. But right before you can complete the upload, a klaxon blares. There’s been an attack! Time to head to the meeting room for the usual finger-pointing and scapegoating before the team decides who to jettison from the ship. ...

Yubico proposes WebAuthn protocol extension to simplify backup security keys

One of the most common questions people have about YubiKeys, and security keys in general, is: “What if I lose my key?”  While WebAuthn and FIDO2, the open standards for security key authentication, promise strong, phishing-resistant and — perhaps most importantly — easy-to-use multi-factor authentication, this question still remains. As of today, there are no answers that ...