2015 Was A Yubico Rocket Ride

Around this time last year, the FIDO Alliance had just released the final draft of the U2F specification, a moment that would greatly impact Yubico’s upcoming year.

Within four months, Google had upped its commitment to U2F, adding support for Yubico’s Security Key in Google for Work. In August, DropBox added support for its user base, and two months later, GitHub joined in with support for U2F strong authentication to protect its users. In just 10 months, the YubiKey was an authentication option for platforms and apps used by tens of millions of people.

U2F, however, was just validation of YubiKey’s pedigree as a modern hardware authentication device.

Next up was a grand introduction of the YubiKey as a security device, including OpenPGP encryption with support for 4096-bit RSA crypto keys, a PKCS#11 library to support PIV functionality, and a relationship with Docker that produced a code signing milestone they dubbed touch-to-sign.

With two strokes, Yubico had revealed its Swiss Army Knife versatility and the value of multiple functions available on a single YubiKey. These milestones injected the YubiKey into the heart of a modern security debate among consumers, enterprises, and governments.

And there was more! Yubico talked online identity protection during a personal meeting with President Obama, explained the ins and outs of cryptography in a multi-part blog series, earned FIDO Certification, forged relationships with the federation players, helped add Bluetooth and NFC transports to U2F that opened mobile devices to the FIDO standard, linked up with LinkedIn, and talked SSH, ECC, and OIDC.

We also had our lighter moments. We met a Princess, had a cameo in a Hollywood movie, detailed the YubiKey’s duties during our work days, and crowned three YubiKings.

We learned to live on less sleep than Buddy the Elf, and that our customers have savvy and knowledge we are glad they openly share with us and others.

Above all, we were humbled by the ruckus the YubiKey caused.

Now, moving into 2016, we are running fast with a new 4th -generation YubiKey, Mozilla’s commitment to add FIDO U2F support to the Firefox browser, and the World Wide Web Consortium’s work to standardize Web APIs and data formats for use with FIDO 2.0.

And, of course, we look forward to the innovations, milestones and surprises we know will illuminate 2016.

Happy New Year!

Talk to our teamTalk to our team

Share this article:


  • An inside look at Yubico’s transition to passwordlessBefore “passkey” became a familiar term in our industry, Yubico had long delivered hardware-backed and phishing-resistant FIDO2 based authentication. Today, the adoption of passkey usage is accelerating. However, it’s taken quite a bit longer to integrate passwordless authentication into the everyday, enterprise-grade authentication flows that are required for today’s businesses.  As long as it’s been […]Read moreOktapasswordless
  • Mission matters – my reflections on winning the EY World Entrepreneur of the Year “This is the biggest mission any of the entrepreneurs have presented in this competition.”  I heard these words a few weeks ago from one of the judges for the EY World Entrepreneur of the Year award program – whom I had the honor to meet during the final step of the world’s largest entrepreneur competition.  […]Read moreawardsFounderStina Ehrensvard
  • Yubico recognized by TrustRadius 2025 Award for top customer reviewsAs AI-driven cyber threats like credential phishing evolve and grow in complexity, phishing-resistant YubiKeys are an important component toward cyber resilience — and our mission to make the internet more secure has never been more critical. To support this, customer feedback is something we take very seriously and is an invaluable tool to ensure we’re […]Read moreawardsTrustRadius
  • CEO Corner: Maintaining stable growth while navigating global uncertaintyAs we officially close out the first quarter of 2025,  I am pleased we saw a quarter with solid growth and profitability along with ongoing demand for phishing-resistant authentication. We continue to see new types of high-profile cyber attacks appearing regularly, and a major reason for the success of phishing attacks is stolen credentials. As […]Read moreCEOCEO CornerEarningsMattias Danielsson