Multi-factor authentication / MFA stories
What to know when considering zero trust digital transformation
The security landscape is constantly changing, but SASE can help organisations tackle countless security challenges.
Why zero trust must form a key pillar of any cybersecurity strategy
Zero trust streamlines that access while strengthening security protections. For this reason, it should form an essential pillar of any cybersecurity strategy.
Best practices and key factors for identity management
In parallel with any physical form of identification, digital identities must be protected at all costs to prevent identity theft or fraud.
Yubico pledges to secure world's most at-risk organisations
Yubico is partnering with Microsoft to offer 25,000 free YubiKey security keys to high profile and high risk organisations across 31 countries.
Xero launches authentication app to boost account security
“With 80% of data breaches being preventable, the roll out of mandatory MFA is a really important way to provide our customers extra protection."
Essential tools for managing user identity and how they impact your bottom line
Customer identity and access management (CIAM) is how companies give their end-users access to their digital properties, as well as how they govern, collect, analyse, and securely store data for those users.
We're not ready for passwordless systems—and that's quite alright
Although passwordless authentication options are gaining prominence, there's a reason why we're still using passwords 60 years after their inception: they're effective.
COVID-19 crushes fingerprint reader market
However, the biometrics market is expected to regain momentum with alternatives already beginning to find their feet.
Yubico rolls out subscription service for hardware authentication keys
“With immediate success from the initial roll out in the US and Canada, we are proud to now offer YubiEnterprise Subscription to our APAC channel partners.”
Why cybersecurity and employee experience go hand-in-hand
Each individual represents an access point into the network, and one compromised user can result in a cascade of ramifications with long-lasting consequences.
The 5 most common multi-factor authentication (MFA) methods
While MFA is ubiquitous, it’s far from perfect – whether you’re the business or the end-user. Here are the 5 most common MFA methods, and where each of them falls short.
The real reason to use risk-based authentication in the enterprise
By analysing what the user knows, has, and does, the risk engine can identify legitimate users while denying access to intruders.
Security experts underscore identity assurance in post-lockdown era
Organisations should rebuild, re-prioritise and re-assess their current security programs, with the ultimate goal of enhancing threat response.
Arrow to distribute SecureAuth identity security
The technology provides a solution for public and private sectors delivering secure access to systems, applications, and data.
Interview: Yubico A/NZ vice president on passwords in the modern world
"With open authentication standards, like WebAuthn and FIDO2, a passwordless future is attainable."
Six practical tips for better password practice
rsenal, Star Wars and Eminem all featured in the top 300 most hacked passwords last year.
Three ways to protect your business in the cloud
A modern BYO-anything workforce means more access points, hidden apps and hurdles to secure across the organisation.
Biometric authentication balances security and simplicity
One touch of a fingerprint or face scan can securely grant access – a much more seamless user experience than remembering and typing out a password.
Can we protect against cryptocurrency theft?
Once cryptocurrency is stolen, there is no refund like there is with a bank or credit card company, and governments offer no protection for users.
Cloud security planning – here’s to a safer future
Discussion is likely to focus on cloud security, with IT professionals asking themselves: How did we cope with the threat situation last year?
Organisations still not getting cybersecurity fundamentals right - Wavelink
Research shows that nearly 60% of organisations that suffered a data breach in the two years between 2016 and 2018 fell victim to a known vulnerability with patches available.
Thales announces expanded access management capabilities
New adaptive authentication, single sign-on and application visibility capabilities have been made available for Thales SafeNet Authentication Service customers.
Time to include multi-factor authentication in your cybersecurity strategy - WatchGuard
Enterprises looking to reduce the risk of cyber-compromise or attack need to think about adding multi-factor authentication technology to their arsenal.
Yubico launches lightning-compatible security key
Today, the YubiKey 5Ci can be used to secure the 1Password, Bitwarden, Dashlane, Idaptive, LastPass, and Okta iOS mobile applications.