Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • The Future of Authentication: How Two Factor Authentication is Dying
    The Future of Authentication: How Two Factor Authentication is Dying
    Dr. Johannes Ullrich, SANS Recorded: Jun 2 2019 59 mins
    We all know that passwords do not work. For many years, ubiquitous phishing attacks, brute forcing, and credential stuffing using reused passwords has shown that organizations should not rely on passwords to authenticate users. This has pushed many organizations to race to implement two factor authentication.

    Two factor authentication has become a lot cheaper and simpler to implement in recent years, but the bad guys didn't rest on their data stashes either, and implemented some effective means to attack sites protected by two factor authentication. In addition, more and more users are using mobile devices as primary means to access web applications. Mobile web applications are often difficult to use with complex passwords and two factor authentication.

    Luckily, standard organizations have been working on this problem, and we now have some emerging standards that are being deployed in popular browsers. In this webcast, you will earn how these new standards like WebAuthn work, how to implement them, and what attacks they protect from.
  • Enabling GRC with Secure Authentication Across the Digital Ecosystem
    Enabling GRC with Secure Authentication Across the Digital Ecosystem
    IT GRC Forum Recorded: May 30 2019 77 mins
    The days of securing a well-defined perimeter around your organization are gone. The cloud, mobile technologies, the internet of things (IoT) and diverse user groups freely exchange data across digital ecosystems, network and economies. This fluidity, however, means that organizations must secure access at multiple points throughout the organization, or risk letting in intruders seeking to hijack data.

    To manage the increasingly diverse digital landscape, IT and security managers need to move beyond usernames and passwords, and expand their use of multi-factor authentication (MFA) to help provide secure and convenient access to the critical data and systems users need. On this webinar our panel of experts will address how secure authentication can help enable GRC across the digital ecosystem, and they will share tips on:

    • Securing access at all points across applications, devices, users and environments.
    • Sharing insights across security systems to strengthen security.
    • Collecting and analyzing information to stop attacks.
    • How MFA can transform secure access—to any application, from any device, anywhere, at any time.
    • Strengthening identity assurance with privileged users.

    Moderator: Colin Whittaker, founder of Informed Risk Decisions

    Panelists: Jerrod Chong, SVP of Product at Yubico; Richard Bird, Chief Customer Information Officer at Ping Identity; Teju Shyamsundar, Senior Product Marketing Manager at Okta; and Andy Smith, Vice President of Product Marketing at Centrify.
  • Securing PKI with PrimeKey EJBCA and the YubiHSM 2 by Yubico
    Securing PKI with PrimeKey EJBCA and the YubiHSM 2 by Yubico
    Chris Job - PrimeKey, Professional Services Team Leader / Sebastian Elfors - Yubico, Solutions Architect Recorded: May 6 2019 35 mins
    Hardware security modules are table stakes when it comes to maintaining customer trust to protect against data theft and compromise. The world’s smallest hardware security module from Yubico, the YubiHSM 2, is now compatible with EJBCA for a range of public key infrastructure (PKI) use cases. PrimeKey and Yubico offer open source software and tools for implementing PKI based on PrimeKey’s EJBCA and the YubiHSM 2.

    Join Yubico Solutions Architect Sebastian Elfors,and PrimeKey Professional Services Team Leader Chris Job, for a technical webinar on how to secure your most critical data with PrimeKey EJBCA and the YubiHSM 2.

    This session will include:

    * An introduction to securing PKI with a hardware security module
    * Primary setup of the YubiHSM 2
    * Deploying YubiHSM 2 with PrimeKey’s EJBCA
    * Configuring the YubiHSM PKCS #11 library
    * Configuring EJBCA for use with YubiHSM 2
    * Adding and activating YubiHSM 2 Crypto Token in EJBCA AdminWeb
    * And more

    It is highly recommended that attendees read the EJBCA with YubiHSM 2 Usage Guide prior to attending this session in order to get a good baseline understanding.

    The usage guide is available here: https://developers.yubico.com/YubiHSM2/Usage_Guides/EJBCA_with_YubiHSM2.html
  • Enabling Digital Transformation: Best Practices for Authentication
    Enabling Digital Transformation: Best Practices for Authentication
    Abby Guha, Sr. Director, Product Marketing, Yubico Recorded: Mar 13 2019 45 mins
    The digital transformation of financial services is placing new demands on organizations looking to balance ease-of-use with security and stringent compliance regulations. How should financial services organizations provide secure access to customer information, account details, and other sensitive information without all the complexity?

    Most systems and applications require passwords and some may even have text based mobile authentication, but is that enough? How can organizations take advantage of new models for user authentication that offer opportunities to deliver ease of use while adhering to stringent security requirements.

    Attend this webinar to learn:

    - Risky password practices being used in workplaces
    - Best practices for enterprise authentication
    - How to mitigate risk with multi-factor authentication
    - Use cases for providing strong authentication to your employees and customers
  • 2019 State of Password and Authentication Security Behaviors
    2019 State of Password and Authentication Security Behaviors
    Dr. Larry Ponemon, Ph.D., Chairman and Founder, Ponemon Institute and Abby Guha, Sr. Director Product Marketing, Yubico Recorded: Feb 20 2019 59 mins
    Despite the worsening state of online security, are we becoming more security-minded, and better yet, are we following best practices?

    The Ponemon Institute recently surveyed 1,761 IT and IT security practitioners in the United States, United Kingdom, Germany and France regarding password management and authentication practices for individuals both in the workplace and at home.

    What percentage of phishing attack victims changed their password behaviors?
    How many respondents admit to reusing passwords?

    The answers to these questions may surprise you.

    Attend this webinar to hear about the survey results and learn:

    * How privacy and security concerns affect password behaviors
    * Risky password practices in the workplace
    * What authentication technologies are being used
    * The cost of lost productivity associated with password management
    * Best practices for enterprise authentication
  • World's Smallest HSM Secures Modern Infrastructures: YubiHSM 2 Open Source SDK
    World's Smallest HSM Secures Modern Infrastructures: YubiHSM 2 Open Source SDK
    Abby Guha, Senior Director Product Marketing (Yubico) Recorded: Dec 5 2018 35 mins
    Security breaches are a growing industry wide problem that in 2018 cost companies an average of $3.8 million per breach. Software storage of cryptographic keys for servers is increasingly vulnerable as attacks become more sophisticated.

    Traditionally, organizations have used Hardware Security Modules (HSMs) that were costly and complex to set up. However, with the YubiHSM 2, organizations of all sizes can enable effective security for cryptographic keys, across the entire lifecycle, in a portable and affordable hardware form factor. And with the new open source SDK, developers can build in hardware based strong security for cryptographic keys across a wider range of platforms and services than ever before.

    Attend this webinar to learn more.
  • The State of Identity and Security in the Age of Cyber Attacks
    The State of Identity and Security in the Age of Cyber Attacks
    Sushila Nair (NTT DATA Services) | Derek Hanson (Yubico) | Ian Spanswick & Rebekah Moody(ThreatMetrix Inc LexisNexis Risk Co) Recorded: Nov 13 2018 48 mins
    Cyber attackers are becoming more sophisticated and data breaches are on the rise. According to a recent report, over 4.6 billion records were breached in the first half of 2018, showing a 133% increase compared to last year.

    With sensitive, personal and confidential data being at risk of ending up in the hands of cyber criminals, enterprises of all sizes are looking to strengthen their security in 2019.

    Join this exclusive keynote panel of industry experts as they discuss:
    - Trends in cyber attacks and breaches
    - Who is at risk
    - How to prevent breaches, data theft and future cyber crime
    - Advances in authentication
    - New in identity and access management
    - Security awareness and training
    - Best practices for securing the enterprise

    - Sushila Nair, Sr. Director Security Portfolio, NTT DATA Services
    - Derek Hanson, Sr. Director Solutions Architecture & Standards, Yubico
    -Rebekah Moody, Fraud & Identity Director, ThreatMetrix
    -Ian Spanswick, VP Professional Services EMEA,ThreatMetrix
  • Who Is A Privileged User, Really? You May Be Surprised by the Answer
    Who Is A Privileged User, Really? You May Be Surprised by the Answer
    David Treece, Sr. Solutions Architect, Yubico, Bassam Al-Khalidi, Co-CEO and Principal Consultant, Axiad IDS Recorded: Oct 24 2018 38 mins
    Allowing employees to use their own devices, and consequently moving enterprise assets to the cloud, can certainly improve productivity, but also puts the organization at risk for additional security threats. According to Gartner, more than 50% of organizations are unable to extend incumbent authentication methods to safely enable access for an increasingly mobile workforce.

    The way forward? Start by understanding that the IT Team is not your only high security risk. Organizations need ID assurance for every person and every system that puts the enterprise at risk. Until now, achieving this was too complex.

    Enterprises can now cost-effectively and easily extend their current authentication solutions. This all starts with accurately establishing the appropriate privilege level by identifying and defining who or what is actually “privileged”, based on access to sensitive information or privileged data. In this webinar, Yubico and Axiad IDS will discuss:

    - Why identifying privileged users is at the root of data breach prevention and what it takes to extend strong authentication across the enterprise
    - How enterprises can securely and efficiently manage the lifecycle of their devices and credentials, while saving on deployment and IT operational costs
    - The key benefits of enabling hardware-backed two-factor authentication to address the demands of an expanding digital workplace
  • Meet the YubiKey 5 Series
    Meet the YubiKey 5 Series
    Alex Yakubov, Sr. Director Ecosystem Recorded: Oct 2 2018 21 mins
    Join us for a session on the new YubiKey 5 Series and learn about the new features and benefits of our latest product line. We'll cover the difference between the YubiKey 5 Series with the YubiKey 4 Series and YubiKey NEO, as well as introduce the use cases and concepts of going passwordless.
  • Making sense of Blockchain and Authentication
    Making sense of Blockchain and Authentication
    Ali Yahya, Partner, A116Z, Stina Ehrensvard - CEO/Founder, Alex Yakubov, Sr. Director of Ecosystem, at Yubico Recorded: Sep 19 2018 46 mins
    You solve security challenges in the realm of authentication and identity—and now the new buzz word “blockchain” is popping up everywhere. Join Yubico founder Stina Ehrensvard and a16zcrypto Partner Ali Yahya for a session on blockchain and authentication technologies. We’ll help you make sense of these technologies, and how they fit together in the security and identity management landscape.

Embed in website or blog