Tag: security
-
What is FIPS 140-2? What does it mean to be FIPS 140-2 Certified/Validated? To be FIPS 140-2 certified or validated, the software (and hardware) must be independently validated by one of 13 NIST specified laboratories, this process can take weeks. The FIPS 140-2 validation process examines the cryptographic modules. Level 1 examines the algorithms used in the cryptographic component […] Read more FIPS 140-2 NIST security YubiKey FIPS Series -
Two-factor authentication (2FA) What is two-factor authentication? Two-factor authentication (also known as 2FA or two-step verification) is a method to confirm a user’s claimed online identity by using a combination of two different types of factors. A password is typically considered one factor, and with 2FA that is combined with another factor to increase login security. Factors used […] Read more 2FA authentication security -
4 reasons to consider a security-first approach to product development The internet is a powerful invention. It was originally built for collaboration, but it’s far surpassed the capabilities anyone could have expected, and has become a core function of society. As developers, we contribute to these incredible advancements every day, but it’s also our job to help protect and preserve the future of the internet. […] Read more data breach security -
Digital Transformation: Are Enterprises Sacrificing Security for Speed? Join Entrust Datacard, RSA, Secret Double Octopus, and Yubico for a talk on security strategies. Read more security -
Top Yubico Partners to Modernize your Workplace Login The workplace is evolving and expanding well beyond the four walls of a corporate office, and with this expansion comes new questions about how to secure employee login. In 2019, fifty-one percent (51%) of IT professionals said their organization experienced a phishing attack, making it dire for organizations to identify solutions that employees can use […] Read more passwordless remote workers security strong authentication Works with YubiKey -
Top 10 tips from employees for working from home Recently, remote access has become the new way of working for many businesses and our team at Yubico has also had to adapt to this new reality. Last week, we published the first entry in our remote working blog series: 5 ways the YubiKey can protect your remote workforce from phishing and other attacks. Now, […] Read more remote workers security YubiKey -
4 security tips: for developers, by developers As National Cybersecurity Awareness Month comes to an end, our focus turns to what the developer community can do to stay cyber smart all year long. We’ve already talked about access management, and shared tips on how to protect your personal accounts. Today, we offer tips from the Yubico Developer Team to developers looking to […] Read more developers security Yubico Developer Program -
Yubico Releases the 2019 State of Password and Authentication Security Behaviors Report In conjunction with Data Privacy Day, Yubico is releasing today new research in a report entitled, The 2019 State of Password and Authentication Security Behaviors Report, conducted by Ponemon Institute. The findings reveal that despite a growing understanding of security best practices, user behavior is still falling short. The problem? Passwords continue to trip up […] Read more 2FA authentication passwordless security -
Ponemon 2019 State of Password and Authentication Security Behaviors Report There are a growing number of security breaches happening daily to individuals and businesses. Read more authentication security -
5 Best Practices for Companies Serious About Data Privacy If you caught this month’s earlier blog, you’ll know that Yubico is partnering with the National Cybersecurity Alliance to support Data Privacy Day, which takes place on January 28. Protecting privacy is one of the main end goals of a security program. It’s incredibly important to us at Yubico to empower and educate individuals and […] Read more data breach MFA security