Tag: authentication

Home » authentication » Page 4
  • Privileged Access Management at CERN: Q&A with Dr. Stefan LüdersIn an era of increasing cyber attacks, how do you balance the desire for unrestricted research freedom against the need to protect that research from cyber threats? This is the challenge faced by CERN, leaders in the scientific research community. Their solution? Provide a clear articulation of what constitutes privileged data, and create flexible security […]Read moreauthenticationMFAphishing-resistant MFAprivileged access manegementprivileged usersYubiKey
  • Why legacy authentication is putting your users at riskStep one in any effective cyber security program includes securing privileged accounts, credentials, and secrets with modern strong authentication. Download the Yubico White Paper, The critical strong authentication need for privileged users, to learn who really is a privileged user, and industry best practices to secure your privileged users against phishing attacks and account takeovers.Read moreauthenticationprivileged users
  • Salesforce is requiring MFA: Why this matters and what you can doAs sophisticated cyberattacks continue their relentless pursuit towards SMBs and enterprises, companies must prioritize improvements to their cybersecurity infrastructure to better secure their customers, employees, and partners. Username and passwords no longer provide adequate security against the ever evolving landscape of cyberattacks.   Late last year, Salesforce took a strong and decisive stance, announcing that beginning […]Read moreauthenticationFIDOFIDO U2FMFAYubiEnterpriseYubiKey
  • Yubico’s top information security recommendations for 2022Last  week, we shared a look back at 2021, which experienced an increase in the number of high profile security breaches, many involving devastating ransomware attacks. Attackers preyed on traditionally softer targets like hospitals, schools, and local governments, in addition to the continued focus on the supply chain. Although the root cause for many of […]Read moreauthenticationgovernmentMFAphishingprivacyzero trust
  • MFA implementation and the users you need to reach: overachievers, traditionalists and cautious employeesWhen a breach investigation team assembles after an incident at a company or organization, misinformed users often get added to the ‘suspects list’ because accidents happen that sometimes lead to holes in security. Though everyone in a company means well, just like accidentally dropping a glass or losing your car keys, the reality is that […]Read moreauthenticationdata breachMFAmultifactor authentication
  • A Day in the Life: Dispelling the Myths of Mobile AuthenticationCOVID-19 initiated the most rapid digital transformation ever witnessed—organizations fast-tracked two-factor and multi-factor authentication to transition millions of employees to work from home. But with remote and hybrid work likely to continue in 2022 and beyond, it’s time to step back and ask: is my in-use authentication as secure as I think it is? Is […]Read more2FAauthenticationMFAmobile authenticationphishing
  • In passwordless authentication, who is holding the keys?Strong authentication practices are based on validating a number of authentication factors to a relying party (RP) or identity provider (IDP) to prove you are who the RP expects. Examples of relying parties could be Dropbox or Salesforce. Identity providers, who can also be a relying party that interacts with the authenticator, include Microsoft Entra […]Read more2FAauthenticationFIDO2MFApasswordless
  • Mitigation and incident response plans to help prevent ransomware attacksWe’ve all grown accustomed to a flood of ransomware attack  news almost every week, with no end in sight. The recent arrest of two Ukrainian ransomware attackers demonstrates that the White House is serious about going on the offensive against ransomware distributors. But often enforcement could end up being a game of whack-a-mole — hit […]Read moreauthenticationFIDOMFAransomwaresecurity key
  • Making the internet safer for everyone, one YubiKey at a timeWhen the internet was designed 30 years ago, security was not a priority as it was primarily created as a way to connect and easily share information with others around the world. Fast forward to today with news of hacks and breaches almost daily, much of the online world is trying to play catch up […]Read more2FAauthenticationGoogleYubiKey
  • YubiEnterprise Delivery Service expands to 49 countries to help customers increase remote work security for distributed workforcesThe past two years have seen a tremendous amount of change regarding normal business processes for companies around the world, and our customers are no exception. When YubiEnterprise Delivery was first launched in May of 2020, organizations and their workforces, partners, and customers were just beginning to grapple with the new challenges that the pandemic […]Read moreauthenticationMFAremote workersYubiEnterpriseYubiKey