Author: Yubico Team

  • U2F, Google, Yubico Lead Authentication MakeoverThe authentication landscape has been altered and evidence of that can be seen among a trio of front runners: FIDO U2F, Google and Yubico. This week, Yubico laid out the details during a live webinar entitled “FIDO U2F, Google Drive for Work and YubiKey,” that is now available for playback online. The in-depth discussion starts […]Read moreGoogleU2F
  • Google Tools Boost Value of YubiKeys, FIDO U2FDeploying enterprise software or services that lack a management console is comparable to jumping out of a plane without a parachute. It’s just not done without damaging consequences. Today, Google delivered a parachute to all high-flying enterprises seeking managed two-factor authentication for their Google Drive for Work deployments. The company updated the Drive for Work Admin […]Read moreGoogleU2F
  • An Edge over the Bad GuysThe one thing end-users don’t seem to have over hackers these days is an edge. Yubico is changing that. Today, we introduce a new key we’ve dubbed the YubiKey Edge. The goal is a cost-effective key with a collection of second-factor authentication options that guard against attacks on your accounts either via malware, phishing and other […]Read moreFIDO U2F security keysecurity keyYubiKey Edge
  • YubiKey, YubiHSM: Secret Weapons to Guard SecretsU.S. intelligence officials in 2013 said they planned to significantly reduce the number of individuals within their network with system administrator privileges. Those privileges gave administrators rights to view and move around any document. “U.S. intelligence has invited so many people into the secret realm,” an official told NBC News, that it left the organization overly exposed to threats […]Read moreFIDO U2F security keyYubiHSM
  • Yubikey and the Emerging World of Wireless Mobile AuthenticationWireless has become the de-facto connecting point for consumers today and even among enterprises, where employees expect to leave behind desktop Ethernet connections for wireless connectivity in board rooms, conference rooms and common areas. Apple makes this point emphatically with its new MacBook where the message is everything should be done without wires via technology […]Read moreauthenticationmobile authenticationU2F
  • My Work Day Reflects YubiKey’s FlexibilityI work as a developer at Yubico. Like a lot of developers these days I’m empowered to not only develop software, but to publish it and configure the servers it runs on. This means that I have access to many systems, to which I authenticate using different keys, requiring the flexibility of a YubiKey. The […]Read moreauthenticationFIDO U2F security keyU2FWorks with YubiKey
  • YubiKey’s Hollywood Cameo Trips up Bad GuysThe YubiKey made it into Hollywood’s spotlight last weekend, taking on a plot-turning cameo appearance in the movie Blackhat. (Cue the suspenseful music). When it was all said and done, the YubiKey showed some of the power of two-factor authentication – not in terms of fingering (pun intended) the suspect, but narrowing the field of potential […]Read moreabout Yubico
  • FIDO U2F Ecosystem Coming AliveUpdate: New entries added to Enterprise Software list; new section, Governments, added; April 13, 2016 FIDO U2F (Universal 2nd Factor) is, as the name implies, a universal protocol that supports a wide range of modalities and use cases. Many people forget this fact given the current popularity of the USB form factor. But evidence is mounting including biometric, software, […]Read moreFIDO AllianceU2FWorks with YubiKey
  • Authentication: More Maturity, Choices in 2015The past 12 months have been stressful given breaches and privacy violations and countries blocking all or part of their citizens’ access to the Internet (which by the way turned 25 in May). As the calendar turns to 2015, there is unprecedented power and pitfalls harnessed in computing devices and digital life. All this connectivity puts […]Read moreabout Yubico
  • FIDO Aims at Standardized Strong AuthenticationIn the early 1990s, a company called Softswitch found itself at a strategic crossroads in that it held the key to integrating disparate electronic messaging systems. So strategic, in fact, that Lotus Software paid $62 million to acquire the company and send a ripple of fear through its main email competitor Microsoft. In a story […]Read moreFIDOFIDO U2F security keystrong authentication