CISA pushes guide for high-value targets to secure mobile devices

The guide comes as the government continues to deal with the fallout of the Salt Typhoon hack.

The post CISA pushes guide for high-value targets to secure mobile devices appeared first on CyberScoop.

Continue reading CISA pushes guide for high-value targets to secure mobile devices

Password management habits you should unlearn

Despite advancements in security technology, many individuals and organizations continue to rely on outdated and vulnerable authentication methods, leaving themselves exposed to cyber threats. This ongoing reliance on insecure methods has led to a stea… Continue reading Password management habits you should unlearn

The most common authentication method is also the least secure

Despite the rise in cyber threats, many people do not have a holistic view of security, according to Yubico. The results of the survey uncovered concerning patterns and behaviors when it comes to personal and workplace cybersecurity, including the exte… Continue reading The most common authentication method is also the least secure

Vulnerability allows Yubico security keys to be cloned

Researchers have unearthed a cryptographic vulnerability in popular Yubico (FIDO) hardware security keys and modules that may allow attackers to clone the devices. But the news is not as catastrophic as it may seem at first glance. “The attacker … Continue reading Vulnerability allows Yubico security keys to be cloned

Yubico and Straxis enable secure access to protected DOD websites and services

Yubico and Straxis launched a new Secure Web browsing application called MilSecure Mobile. This application can be adopted by any Defense Department (DOD) organization to enable secure access to protected DOD websites and services by service members an… Continue reading Yubico and Straxis enable secure access to protected DOD websites and services

Photos: Infosecurity Europe 2023, part 3

Infosecurity Europe is taking place at ExCeL London from 20-22 June 2023 and Help Net Security is on site. The first gallery is available here, and the second gallery is here. Here’s a closer look at the conference featuring: Swimlane, Adaptiva, … Continue reading Photos: Infosecurity Europe 2023, part 3