NIST recently released an update to SP800-63B to provide guidance on syncable authenticators. As FIDO passkeys continue becoming more adopted and available at a large scale, NIST guidance helps organizations properly position and plan so they can successfully implement synced passkeys both internally and externally. Within the guidance, it’s important to understand the nuance of […]
Read morePasswords are ingrained in enterprises with traditional identity lifecycle stages, which exposes them to increasingly sophisticated cyber attacks that rely on stolen login credentials for success like phishing. Phishing is one of the greatest cybersecurity risks that enterprises face – in fact, stolen passwords are one of the largest threat vectors compromising online security today […]
Read moreEarlier this month, we announced the launch of Yubico Authenticator 7 as well as the upcoming availability of YubiKey 5.7 firmware. Beginning today, we’re excited to share that YubiKey 5 Series, Security Key Series, and Security Key Series – Enterprise Edition keys purchased and shipped from Yubico will include the new firmware. Keys with the […]
Read moreNote: Keys with YubiKey 5.7 firmware are now available as of May 21, 2024! Please visit our blog post here for more details. As phishing attacks evolve and are on the rise, organizations are continuously seeking modern, strong authentication technologies like FIDO-based passwordless logins and smart card solutions to safeguard their digital assets, employees, customers […]
Read moreToday, May 2nd, is World Password Day. Each year, this serves as an annual reminder to take action and steps to ensure our digital lives are secure. Now, more than ever with data breaches relying on poor password management to gain access to sensitive data, this day has become a cornerstone in promoting cybersecurity awareness […]
Read moreNote: This article is also featured in Fortune Magazine here. Phishing, a common tactic used by hackers to obtain access to sensitive information, is accredited as a contributing factor in over 80% of all security breaches. Phishing occurs when malicious actors impersonate a legitimate entity to deceive people into providing personal information – typically via […]
Read moreEvery second, a phishing attack takes place. In fact, over 80% of cyber attacks are a result of stolen login credentials from attacks like phishing – mostly due to the relatively low cost and high success rate to execute these attacks. Unfortunately, this pattern will continue to grow as attackers become more sophisticated, utilizing tools […]
Read moreWe’re honored to share that today we are joining the Cybersecurity & Infrastructure Security Agency (CISA) as they launch a new webpage to provide resources for high-risk individuals and organizations to receive the tools they need to protect themselves online. This webpage is the product of the Joint Cyber Defense Collaborative’s (JCDC) High-Risk Communities Protection […]
Read moreTake advantage of the longstanding collaboration between Microsoft and Yubico by deploying YubiKeys together with the new Surface Pro 10 for your enterprise.
Read morePasskeys have taken the online security world by storm since their inception in mid-2022, even if the underlying technology can technically be traced back to FIDO2 and its breakthrough onto the world stage in 2018. Popularity has no doubt exploded due to their widespread adoption by the world’s largest tech companies – who also happen […]
Read more