What Is Phishing-Resistant MFA and How Does it Work?

What Is Phishing-Resistant MFA and How Does it Work?

Phishing, despite its somewhat innocuous name, remains one of the foremost security threats facing businesses today. Improved awareness by the public and controls such as multi-factor authentication (MFA) have failed to stem ...
A YubiKey 5

Yikes, YubiKey Vulnerable — ‘EUCLEAK’ FIDO FAIL?

USB MFA SCA😱: Infineon hardware and software blamed for timing side-channel attack on popular auth tokens ...
Security Boulevard
HYPR and Microsoft Partner on Entra FIDO2 Provisioning APIs

HYPR and Microsoft Partner on Entra FIDO2 Provisioning APIs

Yesterday at the Black Hat conference, Microsoft announced the public preview of Entra FIDO2 provisioning APIs. HYPR worked closely with Microsoft on these critical enhancements, which make it easier for Entra customers ...
Identity Evolved: The Rise of Multi-Factor Verification

Identity Evolved: The Rise of Multi-Factor Verification

Identity verification has traditionally played an important but limited role in the world of identity and access management (IAM). To establish someone’s identity, you need to prove that they are who they ...
HYPR and Microsoft Partner on Entra ID External Authentication Methods

HYPR and Microsoft Partner on Entra ID External Authentication Methods

Last week, Microsoft announced the public preview of external authentication methods (EAM) for Entra ID. As a close partner, HYPR has worked extensively with Microsoft on the new offering and we are ...
Best Practices to Strengthen VPN Security

Best Practices to Strengthen VPN Security

Virtual private networks (VPNs) form a staple of the modern work environment. VPNs provide an essential layer of protection for employees working remotely or across multiple office locations, encrypting data traffic to ...
The Benefits of a Converged Identity Credential

The Benefits of a Converged Identity Credential

Many strictly regulated industries such as banking and finance rely heavily on identity and access management solutions to secure their systems and infrastructure. Unfortunately, as demonstrated by the Okta breach last year, ...
Aligning With NSA’s Cloud Security Guidance: Four Takeaways

Aligning With NSA’s Cloud Security Guidance: Four Takeaways

The National Security Agency (NSA), in conjunction with the Cybersecurity and Infrastructure Security Agency (CISA), recently released its “Top Ten Cloud Security Mitigation Strategies” for organizations to make their cloud environments more ...
Protecting Against Attacks on NTLM Authentication

Protecting Against Attacks on NTLM Authentication

When it comes to cyberattacks, March has come in like a lion for Microsoft. Last week, Microsoft said in an SEC filing that that information stolen in a hack of senior leaders’ ...
HYPR Featured Launch Partner for YubiKey Bio Multi-Protocol Edition (Early Access)

HYPR Featured Launch Partner for YubiKey Bio Multi-Protocol Edition (Early Access)

Today Yubico announced the expansion of its YubiKey Bio Series to include multi-protocol keys that support biometric authentication for FIDO and Smart Card/PIV protocols. Like other YubiKey Bio Series, the new multi-protocol ...