YubiHSM 2 (v2.4) expands to include simplified and secure backups and ‘Bring Your Own Key’ support
As the rate and complexity of credential theft and phishing attacks on enterprises continue to increase rapidly, so do the […]
As the rate and complexity of credential theft and phishing attacks on enterprises continue to increase rapidly, so do the […]
Yubico has had an impressive first half of the year, with plenty of exciting developments as the company continues to
Operational Technology (OT) is a critical component of several industries as it powers the systems that control the distribution of
Break glass accounts are crucial accounts that provide access to critical systems during a variety of emergencies. Microsoft’s recent announcement on the
**NOTE: This blog was originally published on August 1, 2024 and has been updated to reflect the shipping timeline of
Let’s look at the key aspects of cybersecurity and compliance that every organization needs to understand. But before that: what is
In the ever-evolving digital landscape, safeguarding online identities has become more critical than ever. As we navigate a world filled with accounts, passwords and sensitive information, the need for robust security solutions that center around the user is paramount. Traditionally, the way to gain access to various online sites and services has only been through
The post Works with YubiKey Spotlight: Securing your password managers with the YubiKey appeared first on Yubico.
As a market leader for open source software products, Red Hat is renowned for helping organizations address modern challenges to technology and cybersecurity trends through innovative solutions that meet evolving demands. Specifically, their perpetual dedication to robust security and authentication standards ensures users, enterprises and agencies can carefully monitor and regulate access to their environments
The post Red Hat Enterprise Linux 9.4 adds passkey support for centrally managed users, including YubiKeys appeared first on Yubico.
NIST recently released an update to SP800-63B to provide guidance on syncable authenticators. As FIDO passkeys continue becoming more adopted and available at a large scale, NIST guidance helps organizations properly position and plan so they can successfully implement synced passkeys both internally and externally. Within the guidance, it’s important to understand the nuance of
The post New NIST guidance on passkeys: Key takeaways for enterprises appeared first on Yubico.
Passwords are ingrained in enterprises with traditional identity lifecycle stages, which exposes them to increasingly sophisticated cyber attacks that rely on stolen login credentials for success like phishing. Phishing is one of the greatest cybersecurity risks that enterprises face – in fact, stolen passwords are one of the largest threat vectors compromising online security today
The post Eliminating enterprise risk: One phishing-resistant user at a time appeared first on Yubico.