Tag: zero trust

Thumbnail

Forging ahead: A CISOs top recommendations to stay secure in 2023

Last year, we anticipated that 2022 would be challenging for cybersecurity. This was proven true with the countless number of sophisticated high-profile phishing and ransomware attacks like DropBox, Twitter, Rockstar Games and Uber (twice). With the introduction of phishing-as-a-service and other sophisticated toolkits that target weaker forms of 2FA, security teams are now prioritizing phishing

Thumbnail

Widespread SMS phishing attack thwarted with Cloudflare Zero Trust and YubiKeys

Learn how physical security keys played a crucial role in not allowing Cloudflare to be another victim in a widespread phishing attack.

Thumbnail

New tools to prevent phishing with Azure AD and YubiKeys

Learn how these new features combined with a YubiKey should be an integral part of your Zero Trust strategy.

Thumbnail

Oct 19, 2022

New phishing-resistant solutions available now with Azure AD and YubiKeys

Microsoft recently announced the release of three new solutions that enable organizations to deploy Azure Active Directory (Azure AD) to fight phishing attacks in Azure, Office 365, and remote desktop environments. These solutions will be essential to mitigate phishing attacks and will play a key role in supporting organizations looking to comply with the Executive

Thumbnail

The importance of hybrid authentication in zero trust architectures

Come learn key differences between PKI and FIDO, how to deploy FIDO within federal security policies, how to deploy FIDO within federal security policies, and more.

Thumbnail

Zero Trust with phishing-resistant MFA is mission-critical

Join Yubico and Okta on September 22nd to learn how YubiKey, combined with Okta Adaptive MFA, work together to provide modern phishing-resistant MFA as well as a simplified user experience for the strongest levels of protection.

Thumbnail

BeyondTrust case study

More than 20,000 customers trust BeyondTrust with Internet Access Management. As a security company themselves, BeyondTrust takes their brand reputation and internal security seriously, and have invested in strong MFA from a partner like Yubico. The case study walks through how BeyondTrust has increased their security posture with a phased rollout of YubiKeys and has not only strengthened their cybersecurity defenses, but have done it in a predictable and efficient way with YubiEnterprise Subscription and YubiEnterprise Delivery services.

Executive Order 14028

Executive Order 14028 is a cybersecurity order issued by President Biden requiring agencies to improve and standardize defenses of their digital systems. The EO spawned a number of policy changes to improve software supply chain security, mandate Zero Trust cybersecurity principles, and phishing-resistant MFA. The recent frequency of widespread and invasive cyber attacks has prompted the government to take action.

Thumbnail

Laying the groundwork for continuous authentication

Continuous authentication is an emerging concept—a future ‘nirvana’ state of security that would provide the capability to validate a user’s identity in real-time as they maneuver between systems, applications, and devices. In theory, continuous authentication solutions would use risk signals from a variety of monitoring sources to authenticate users, identify potential threats and proactively remediate

Cyber Insurance requirements

Cyber insurance requirements are fast changing in light of large financial payouts due to cybersecurity breaches. YubiKeys deliver phishing-resistant MFA to stop breaches.