FIDO
The Benefits of a Converged Identity Credential
Many strictly regulated industries such as banking and finance rely heavily on identity and access management solutions to secure their systems and infrastructure. Unfortunately, as demonstrated by the Okta breach last year, ...
Aligning With NSA’s Cloud Security Guidance: Four Takeaways
The National Security Agency (NSA), in conjunction with the Cybersecurity and Infrastructure Security Agency (CISA), recently released its “Top Ten Cloud Security Mitigation Strategies” for organizations to make their cloud environments more ...
Protecting Against Attacks on NTLM Authentication
When it comes to cyberattacks, March has come in like a lion for Microsoft. Last week, Microsoft said in an SEC filing that that information stolen in a hack of senior leaders’ ...
HYPR Featured Launch Partner for YubiKey Bio Multi-Protocol Edition (Early Access)
Today Yubico announced the expansion of its YubiKey Bio Series to include multi-protocol keys that support biometric authentication for FIDO and Smart Card/PIV protocols. Like other YubiKey Bio Series, the new multi-protocol ...
Using Deterministic Security Controls To Stop Generative AI Attacks
Deepfake cyberattacks, phishing, and social engineering have all received a turbo boost in recent months due to the proliferation of easily accessed AI tools. Cybercriminals are some of the most creative individuals ...
A Closer Look at HYPR’s New Identity Assurance Solution
Earlier this month, HYPR announced our unified Identity Assurance solution, developed to secure the entire modern identity lifecycle. HYPR Identity Assurance brings together the strongest passwordless authentication, comprehensive risk assessment and enhanced ...
Build Vs. Buy: The Unknown Unknowns of FIDO-Based Passkeys
There are many unknown unknowns associated with building a FIDO-based passkey solution versus adopting off-the-shelf solutions ...
Google Pushes ‘Passkeys’ Plan — but it’s Too Soon for Mass Rollout
FIDO FAIL: “Killing passwords” is a worthy goal—but is coercion the best way? ...
Gmail Adds Extra Checks, Thwarting Sneaky Hackers
Sensitive actions such as forwarding to be protected by extra 2FA step ...
How Secure Are Passkeys?
As I was walking around Identiverse last week, I was reminded of the old Barbara Mandrell song, “I Was Country, When Country Wasn’t Cool.” HYPR has been doing passkeys since passkeys (then ...