Get Your Free Risk Report Today

Whitepapers

Displaying White Papers for Yubico

Meeting authentication compliance for CJIS with Yubico

Meeting authentication compliance for CJIS with Yubico Strong multi-factor authentication for first responders In order to meet section 5.6.2.2.1 Advanced Authentication Policy and Rationale, departments handling NCIC information need to implement two-factor authentication. This can be accomplished with something the user knows (Password/Pin) and something they have (YubiKey).

Read More »

Modern hardware-backed multi-factor authentication and compliance for Federal Government

Modern hardware-backed multi-factor authentication and compliance for Federal Government The Federal Information Security Management Act (FISMA) is a law that requires every government agency and its third parties to implement information security plans. The National Institute of Standards and Technology (NIST) Cybersecurity The framework defines those plans for civilian federal agencies, further clarified and solidified

Read More »

Modern strong authentication and compliance for Financial Services

Modern strong authentication and compliance for Financial Services Financial services companies typically have large supply chains, all the way from application and services vendors to functions that are outsourced to third-party vendors and partners such as call centers. In these scenarios, large amounts of potentially sensitive data are handed over to third parties, and the

Read More »

Modern strong authentication and compliance for Healthcare Organizations

Modern strong authentication and compliance for Healthcare Organizations Strong authentication can be challenging for healthcare organizations, including healthcare payers, providers, pharmaceutical, and service providers. Despite the myriad of regulatory and internal pressures to protect the privacy and security of PHI and the secrecy of intellectual property (IP), are common obstacles to improving authentication including infrastructure

Read More »

The top 5 mobile authentication misconceptions

The top 5 mobile authentication misconceptions – Whitepaper Despite the growing tide and sophistication of cyber attacks, many organizations continue to use legacy authentication methods such as usernames and passwords or mobile-based authenticators, to secure access to critical and sensitive applications and data. But these methods don’t offer the best security—they are highly susceptible to

Read More »
Scroll to Top