Password management habits you should unlearn

Despite advancements in security technology, many individuals and organizations continue to rely on outdated and vulnerable authentication methods, leaving themselves exposed to cyber threats. This ongoing reliance on insecure methods has led to a stea… Continue reading Password management habits you should unlearn

The most common authentication method is also the least secure

Despite the rise in cyber threats, many people do not have a holistic view of security, according to Yubico. The results of the survey uncovered concerning patterns and behaviors when it comes to personal and workplace cybersecurity, including the exte… Continue reading The most common authentication method is also the least secure

Vulnerability allows Yubico security keys to be cloned

Researchers have unearthed a cryptographic vulnerability in popular Yubico (FIDO) hardware security keys and modules that may allow attackers to clone the devices. But the news is not as catastrophic as it may seem at first glance. “The attacker … Continue reading Vulnerability allows Yubico security keys to be cloned

Yubico and Straxis enable secure access to protected DOD websites and services

Yubico and Straxis launched a new Secure Web browsing application called MilSecure Mobile. This application can be adopted by any Defense Department (DOD) organization to enable secure access to protected DOD websites and services by service members an… Continue reading Yubico and Straxis enable secure access to protected DOD websites and services

Photos: Infosecurity Europe 2023, part 3

Infosecurity Europe is taking place at ExCeL London from 20-22 June 2023 and Help Net Security is on site. The first gallery is available here, and the second gallery is here. Here’s a closer look at the conference featuring: Swimlane, Adaptiva, … Continue reading Photos: Infosecurity Europe 2023, part 3

Phishing-resistant MFA shapes the future of authentication forms

Over the last two years, respondents reported a continued reliance on the least secure forms of authentication, including traditional usernames and passwords and one-time passwords (OTPs), according to Yubico. Not all MFA is equal The results are surpr… Continue reading Phishing-resistant MFA shapes the future of authentication forms

Protect your entire business with the right authentication method

In this Help Net Security interview, Tomasz Kowalski, CEO at Secfense emphasizes the significance of multi-factor authentication in the corporate landscape, highlights the use of microauthorizations to improve the security of protected applications, an… Continue reading Protect your entire business with the right authentication method