Generic filters

Authentication

2023 Qualys TruRisk Research Report

Many cybersecurity companies today focus solely on detection, which is a large part of the overall equation. But detection alone is not enough to reduce and eliminate risks within your environment. Stakeholders must also discover and remediate the risks that threaten a company or forever play a game of catch-up with threat actors. You can …

2023 Qualys TruRisk Research Report Read More »

YubiKey 5C NFC

The YubiKey 5 Series is a hardware based authentication solution that provides superior defense against phishing, eliminates account takeovers, and enables compliance requirements for strong authentication.

From Passwords to Passwordless

The problems with passwords are still an ongoing struggle. Undoubtedly, managing passwords is still taking up time that could be spent elsewhere by you and others in your organization. They’re causing a lot of headaches and frustrations for your IT department and organization’s employees alike. Security issues might be the core of that headache for …

From Passwords to Passwordless Read More »

YubiKey 5Ci

The YubiKey 5Ci combines hardware-based authentication and public key cryptography to eliminate account takeovers.

The 2020 State of Password and Authentication Security Behaviors Report

Cyber threats and attacks on individual users and organizations have not diminished. Phishing scams, stolen credentials, and account takeovers continue to rise, making it imperative for businesses to have policies and practices in place to reduce the risks created by poor password and authentication behaviors. What is perhaps more important is that the security policies …

The 2020 State of Password and Authentication Security Behaviors Report Read More »

Derived Personal Identity Verification (PIV) Credentials

Pivot toward using derived PIV credentials on mobile devices. The federal government relies on PIV cards to securely authenticate and identify employees and contractors when granting access to federal facilities and information systems.