Author: Yubico Team
-
Yubico CEO Wins ‘Female Executive of the Year’ Award June has been a busy and exciting month for us here at Yubico. We have been on the road speaking and exhibiting at multiple conferences, were named ‘Best Multifactor Solution’ by SC Magazine Awards Europe, and revealed two new integrations for our YubiKeys. And we’re not done yet! Yesterday, Yubico CEO and founder Stina Ehrensvard was […] Read more -
Yubico at CIS: FIDO, Mobile, ID Proofing. We’ll cover it all! Today kicks off the annual Cloud Identity Summit (CIS) at the Sheraton Grand Chicago, where the brightest minds across the identity and security industry convene to discuss intelligent identity. Yubico will exhibit at the event (Booth #425) and contribute to several speaking sessions regarding FIDO, Federation, ID Proofing, Intelligent Identity, and Mobile SSO. Below are […] Read more -
Find us this week at the Gartner and AFCEA events in Maryland! We have a busy week ahead! Come watch us show off our award-winning YubiKeys at two Maryland events: Gartner Security & Risk Management Summit (National Harbor) on June 12 to 15 and AFCEA’s Defensive Cyber Operations Symposium (Baltimore Convention Center) on June 13 to 15. New U2F integration with Keeper Security We are excited to […] Read more -
We Won! YubiKey 4 Series Recognized as SC Awards ‘Best Multifactor Solution’ Today, at InfoSecurity Europe in London, Yubico graciously received the SC Awards Europe 2017 Excellence Award for Best Multifactor Solution. The YubiKey 4 won in the category of Threat Solutions. “As a contender among four other established and well regarded authentication technologies, the recognition of our YubiKey 4 Series is a great honor,” said Stina […] Read more -
Prevent Account Takeovers: Anti-Phishing Strategies with Yubico Creating accounts online just got a whole lot easier. Now anyone can log in to or register a new account using their existing credentials from social networking services, such as Facebook and Google. With social logins, users won’t have to rack their brain for another password, saving time and securely authenticating their identity. Websites that […] Read more -
10 Easy Ways to Protect Your Identity and Keep Safe Online This week, the Oslo Freedom Forum is hosting its ninth annual conference, bringing together a global community of activists, tech entrepreneurs, and thought leaders sharing the vision of a freer and safer world, including the Internet. Yubico was invited to the event to share how you can use YubiKeys and FIDO U2F (Universal 2nd Factor) […] Read more -
Ready, Set, Earn: Become a Yubico Affiliate through Amazon We have great news for Yubico ambassadors! We’ve found a program that carries on the values of our now-retired Yubico Affiliate Program while empowering affiliates to profit from products they choose to advocate. Amazon’s widely successful Amazon Associates program is booming for a reason. The program gives everyone a chance to earn up to 10% […] Read more -
Episode Y: The Rise of 2FA The security revolution has begun. In a final act of resistance against the dark might of the enemy, the brave heroes have deployed their ultimate weapon, a powerful layer of defense beyond the strength of the password known as 2FA, to a vast group of web sites throughout the universe. As 2FA spreads, a group […] Read more -
YubiHSM 2 open beta launched! With IT security breaches becoming a staple in daily news reports, organizations big and small alike need to ramp up their defense. More than 95% of all IT breaches happen when a user credential or server gets hacked. While the YubiKey protects user accounts from remote hijacking, millions of servers storing sensitive data still lack […] Read more -
Yubico at RSA 2017 – Our Hardware Beats Your Malware It’s that time of year again! We’re heading back to the RSA Conference in San Francisco to show off our latest and greatest at booth #N4421. Keeping online data, accounts, and identities protected is a challenge, and it’s abundantly clear that usernames and passwords are the weakest defense. Daily breaches, hacks, and evolving phishing techniques […] Read more