
Towards Zero Trust: Meet The YubiKey
In cybersecurity, we started with blacklists for applications and services, but that has not scaled well, and so we now often focus on whitelisting — and where we define what’s allowed, and then block everything else. But, if we take the whitelisting concept to its ultimate focus, we end up with Zero Trust infrastructures.