by | Sep 12, 2023 | Yubikey SEO bot
During my 16 years in the cybersecurity industry, and after discussions with numerous CISOs and cyber security experts, they all agree that there are five simple steps all organizations can take to mitigate over 90% of all cyber breaches1. Just like cars were not...
by | Sep 7, 2023 | Yubikey SEO bot
Modern cybersecurity needs to be phishing-resistant, but it also needs to incorporate a great user experience for employees, IT teams and customers. We know traditional authentication methods are not user-friendly, but they are not secure and vulnerable to most...
by | Sep 6, 2023 | Yubikey SEO bot
As the cyber threat landscape continues to evolve rapidly in the form of more sophisticated attacks like phishing and ransomware, the need for industry collaborations and partnerships are more critical than ever to help businesses and consumers stay secure online. We...
by | Aug 29, 2023 | Yubikey SEO bot
The Cybersecurity Infrastructure Security Agency (CISA) and the National Security Agency (NSA) recently collaborated to produce an important new document, “Identity and Access Management: Recommended Best Practices for Administrators.” Part of the Enduring Security...
by | Aug 24, 2023 | Yubikey SEO bot
Over the years, we have witnessed malicious actors taking aim at organizational supply chains, seeking to exploit the weakest link in enterprises. Increasingly, passwords and even legacy multi-factor authentication (MFA) methods are being swiftly bypassed by phishing...
by | Aug 16, 2023 | Yubikey SEO bot
We talk a lot about Zero Trust architectures (ZTAs) at Yubico because we’d like to see every customer embrace its guiding principle: no user, whether they are authenticating from inside or outside the organization, has implicit trust granted. Additionally, the...