{"id":2887,"date":"2021-12-15T19:02:38","date_gmt":"2021-12-15T19:02:38","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-kh\/?page_id=2887"},"modified":"2022-09-06T11:33:57","modified_gmt":"2022-09-06T11:33:57","slug":"yubico","status":"publish","type":"page","link":"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/yubico\/","title":{"rendered":"Yubico"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2887\" class=\"elementor elementor-2887\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4fdf0b87 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4fdf0b87\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e589df4\" data-id=\"1e589df4\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-82ba83f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"82ba83f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-9fedc4b\" data-id=\"9fedc4b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ffdfbfa elementor-widget elementor-widget-shortcode\" data-id=\"ffdfbfa\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t\t<!-- Flexy Breadcrumb -->\r\n\t\t\t<div class=\"fbc fbc-page\">\r\n\r\n\t\t\t\t<!-- Breadcrumb wrapper -->\r\n\t\t\t\t<div class=\"fbc-wrap\">\r\n\r\n\t\t\t\t\t<!-- Ordered list-->\r\n\t\t\t\t\t<ol class=\"fbc-items\" itemscope itemtype=\"https:\/\/schema.org\/BreadcrumbList\">\r\n\t\t\t\t\t\t            <li itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\r\n                <span itemprop=\"name\">\r\n                    <!-- Home Link -->\r\n                    <a itemprop=\"item\" href=\"https:\/\/ivaluegroup.com\/en-kh\">\r\n                    \r\n                                                    <i class=\"fa fa-home\" aria-hidden=\"true\"><\/i>Home                    <\/a>\r\n                <\/span>\r\n                <meta itemprop=\"position\" content=\"1\" \/><!-- Meta Position-->\r\n             <\/li><li><span class=\"fbc-separator\">\/<\/span><\/li><li class=\"active\" itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><span itemprop=\"name\" title=\"Yubico\">Yubico<\/span><meta itemprop=\"position\" content=\"2\" \/><\/li>\t\t\t\t\t<\/ol>\r\n\t\t\t\t\t<div class=\"clearfix\"><\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bcd0934 elementor-widget elementor-widget-heading\" data-id=\"bcd0934\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">Whitepapers<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a750ccf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a750ccf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c1d5f21\" data-id=\"c1d5f21\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b17d2bc elementor-widget elementor-widget-heading\" data-id=\"b17d2bc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Displaying White Papers for Yubico\n<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-876cd4e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"876cd4e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cd96b36\" data-id=\"cd96b36\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-14b78cb elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"14b78cb\" data-element_type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/plugins\/elementor-pro\/assets\/css\/widget-posts.min.css\">\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-5395 post type-post status-publish format-standard has-post-thumbnail hentry category-whitepapers whitepapers-yubico\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/meeting-authentication-compliance-for-cjis-with-yubico\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"370\" height=\"320\" src=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg\" class=\"attachment-full size-full wp-image-2692\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg 370w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-300x259.jpg 300w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-24x21.jpg 24w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-36x31.jpg 36w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-48x42.jpg 48w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/meeting-authentication-compliance-for-cjis-with-yubico\/\" >\n\t\t\t\tMeeting authentication compliance for CJIS with Yubico\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Meeting authentication compliance for CJIS with Yubico Strong multi-factor authentication for first responders In order to meet section 5.6.2.2.1 Advanced Authentication Policy and Rationale, departments handling NCIC information need to implement two-factor authentication. This can be accomplished with something the user knows (Password\/Pin) and something they have (YubiKey).<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/meeting-authentication-compliance-for-cjis-with-yubico\/\" aria-label=\"Read more about Meeting authentication compliance for CJIS with Yubico\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-5389 post type-post status-publish format-standard has-post-thumbnail hentry category-whitepapers whitepapers-yubico\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/drive-competitive-advantage-with-modern-strong-authentication-for-online-and-mobile-banking\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"370\" height=\"320\" src=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg\" class=\"attachment-full size-full wp-image-2692\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg 370w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-300x259.jpg 300w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-24x21.jpg 24w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-36x31.jpg 36w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-48x42.jpg 48w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/drive-competitive-advantage-with-modern-strong-authentication-for-online-and-mobile-banking\/\" >\n\t\t\t\tDrive competitive advantage with modern strong authentication for Online and Mobile Banking\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Drive competitive advantage with modern strong authentication for Online and Mobile Banking &#8211; Whitepaper The digitization of financial services accelerated in 2020. Driven by the COVID-19 a global pandemic, mobile banking penetration grew across all demographics, up to at least 85% for all consumers under age 55.1 However, while mobile and online banking adoption have<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/drive-competitive-advantage-with-modern-strong-authentication-for-online-and-mobile-banking\/\" aria-label=\"Read more about Drive competitive advantage with modern strong authentication for Online and Mobile Banking\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-5383 post type-post status-publish format-standard has-post-thumbnail hentry category-whitepapers whitepapers-yubico\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/modern-hardware-backed-multi-factor-authentication-and-compliance-for-federal-government\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"370\" height=\"320\" src=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg\" class=\"attachment-full size-full wp-image-2692\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg 370w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-300x259.jpg 300w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-24x21.jpg 24w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-36x31.jpg 36w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-48x42.jpg 48w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/modern-hardware-backed-multi-factor-authentication-and-compliance-for-federal-government\/\" >\n\t\t\t\tModern hardware-backed multi-factor authentication and compliance for Federal Government\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Modern hardware-backed multi-factor authentication and compliance for Federal Government The Federal Information Security Management Act (FISMA) is a law that requires every government agency and its third parties to implement information security plans. The National Institute of Standards and Technology (NIST) Cybersecurity The framework defines those plans for civilian federal agencies, further clarified and solidified<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/modern-hardware-backed-multi-factor-authentication-and-compliance-for-federal-government\/\" aria-label=\"Read more about Modern hardware-backed multi-factor authentication and compliance for Federal Government\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-5365 post type-post status-publish format-standard has-post-thumbnail hentry category-whitepapers whitepapers-yubico\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/modern-strong-authentication-and-compliance-for-financial-services\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"370\" height=\"320\" src=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg\" class=\"attachment-full size-full wp-image-2692\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg 370w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-300x259.jpg 300w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-24x21.jpg 24w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-36x31.jpg 36w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-48x42.jpg 48w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/modern-strong-authentication-and-compliance-for-financial-services\/\" >\n\t\t\t\tModern strong authentication and compliance for Financial Services\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Modern strong authentication and compliance for Financial Services Financial services companies typically have large supply chains, all the way from application and services vendors to functions that are outsourced to third-party vendors and partners such as call centers. In these scenarios, large amounts of potentially sensitive data are handed over to third parties, and the<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/modern-strong-authentication-and-compliance-for-financial-services\/\" aria-label=\"Read more about Modern strong authentication and compliance for Financial Services\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-5364 post type-post status-publish format-standard has-post-thumbnail hentry category-whitepapers whitepapers-yubico\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/modern-strong-authentication-and-compliance-for-healthcare-organizations\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"370\" height=\"320\" src=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg\" class=\"attachment-full size-full wp-image-2692\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg 370w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-300x259.jpg 300w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-24x21.jpg 24w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-36x31.jpg 36w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-48x42.jpg 48w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/modern-strong-authentication-and-compliance-for-healthcare-organizations\/\" >\n\t\t\t\tModern strong authentication and compliance for Healthcare Organizations\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Modern strong authentication and compliance for Healthcare Organizations Strong authentication can be challenging for healthcare organizations, including healthcare payers, providers, pharmaceutical, and service providers. Despite the myriad of regulatory and internal pressures to protect the privacy and security of PHI and the secrecy of intellectual property (IP), are common obstacles to improving authentication including infrastructure<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/modern-strong-authentication-and-compliance-for-healthcare-organizations\/\" aria-label=\"Read more about Modern strong authentication and compliance for Healthcare Organizations\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-5363 post type-post status-publish format-standard has-post-thumbnail hentry category-whitepapers whitepapers-yubico\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/the-top-5-mobile-authentication-misconceptions\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"370\" height=\"320\" src=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg\" class=\"attachment-full size-full wp-image-2692\" alt=\"\" srcset=\"https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card.jpg 370w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-300x259.jpg 300w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-24x21.jpg 24w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-36x31.jpg 36w, https:\/\/ivaluegroup.com\/en-kh\/wp-content\/uploads\/sites\/5\/2021\/12\/iValue_White_Papers_Card-48x42.jpg 48w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h4 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/the-top-5-mobile-authentication-misconceptions\/\" >\n\t\t\t\tThe top 5 mobile authentication misconceptions\t\t\t<\/a>\n\t\t<\/h4>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>The top 5 mobile authentication misconceptions &#8211; Whitepaper Despite the growing tide and sophistication of cyber attacks, many organizations continue to use legacy authentication methods such as usernames and passwords or mobile-based authenticators, to secure access to critical and sensitive applications and data. But these methods don\u2019t offer the best security\u2014they are highly susceptible to<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/ivaluegroup.com\/en-kh\/oems\/whitepapers\/the-top-5-mobile-authentication-misconceptions\/\" aria-label=\"Read more about The top 5 mobile authentication misconceptions\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1dbadbb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1dbadbb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-aba3679\" data-id=\"aba3679\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-47189de elementor-align-center elementor-widget elementor-widget-global elementor-global-6829 elementor-widget-button\" data-id=\"47189de\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ivaluegroup.com\/en-kh\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M 18.71875 6.78125 L 17.28125 8.21875 L 24.0625 15 L 4 15 L 4 17 L 24.0625 17 L 17.28125 23.78125 L 18.71875 25.21875 L 27.21875 16.71875 L 27.90625 16 L 27.21875 15.28125 Z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us Today<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Whitepapers Displaying White Papers for Yubico Contact Us Today<\/p>\n","protected":false},"author":1,"featured_media":13600,"parent":2374,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[14,11],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/pages\/2887"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/comments?post=2887"}],"version-history":[{"count":34,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/pages\/2887\/revisions"}],"predecessor-version":[{"id":13964,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/pages\/2887\/revisions\/13964"}],"up":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/pages\/2374"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/media\/13600"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/media?parent=2887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/categories?post=2887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/tags?post=2887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}