YubiKeys: Securing an Existing Environment

1 minute read

We will cover the “why” behind YubiKey security including protecting against phishing and man in the middle attacks, as well as how to help your users overcome “push overload.”

Share this article:

Recommended content

Thumbnail

Quick Take: Executive Order on Improving the Nation’s Cybersecurity

With the recent number of attacks that have had significant impact on critical systems, a new executive order on improving the nation’s cybersecurity has been released, covering many key areas that need to be addressed to protect critical digital infrastructure. This is one of the most detailed U.S. executive orders on cybersecurity and we welcome ...

Thumbnail

Authentication Best Practices to Protect Against Identity Phishing

Learn what strong authentication really is, why it’s key for enterprise-wide identity assurance.

Thumbnail

Government of Nunavut turns to phishing-resistant YubiKeys after ransomware attack

In 2019, the Government of Nunavut was victimized by a phishing attack. Nunavut rebuilt infrastructure and trust using Microsoft’s Azure AD + the YubiKey.

Thumbnail

Examining the CISO agenda in 2021

CISOs are paid to worry, and there’s a lot to worry about in 2021. The recent SolarWinds breach, the Capitol break-in, and a series of high-profile hacks are spurring many enterprises to re-examine their security strategies. We discuss what lies ahead with Yubico’s CISO, Chad Thunberg. Q: What’s top of mind for CISOs in 2021? The SolarWinds ...