Blog

Stay up to date on company and partner news, product tips, and industry trends.

Home » Blog
Who we areWho we are What we doWhat we do Media assetsMedia assets Get in touchGet in touch BlogBlog Press ReleasesPress Releases
  • Introducing Yubico Authenticator 6 for DesktopToday we’re releasing the first public beta version of Yubico Authenticator 6 for Desktop. This new version has some big changes under the hood, so let me explain what they are and why we’re doing them. Or, if you’re just eager to try it out, skip to the bottom of this post and click on […]Read moreauthenticationFIDOWebAuthnYubico AuthenticatorYubiKey
  • A Yubico FAQ about passkeysIn March, we published a blog called “YubiKeys, passkeys and the future of modern authentication” which took a look at the evolution of authentication from when we first introduced the YubiKey back in 2008, to where the industry is heading with the adoption and adaptation of WebAuthn/FIDO authentication. In recent months, there have been several […]Read morepasskeyYubicoYubiKey
  • Compliant PINs and MFA: Modern direction for staying secureEntities within the US Federal Government are in the midst of a drastic change regarding how they approach the services they are using—moving away from traditional on-prem and proprietary systems to cloud services based on private platforms, like Azure and Amazon Web Services. However, the requirements for security remain the same regardless of the platform […]Read moreNISTphishing-resistant MFAPINssmart cardYubiKey
  • Laying the groundwork for continuous authenticationContinuous authentication is an emerging concept—a future ‘nirvana’ state of security that would provide the capability to validate a user’s identity in real-time as they maneuver between systems, applications, and devices. In theory, continuous authentication solutions would use risk signals from a variety of monitoring sources to authenticate users, identify potential threats and proactively remediate […]Read moreauthenticationFIDO U2FFIDO2MFAphishing-resistant MFAzero trust
  • Making sense of the alphabet soup within authentication and modern MFA terminologyThe vast majority of all cyberattacks start with stolen login passwords or other credentials. In a world that is moving to the cloud, our work, personal and government communication systems have become more accessible and vulnerable for anyone on the internet. Of all the different cyberattacks, credential phishing is by far the largest problem and […]Read moreauthenticationMFApasswordlessphishing-resistant MFA
  • WebAuthn implementation: What’s what, why should you care and new updates from YubicoWhen it comes to WebAuthn, there’s certainly no shortage of acronyms or protocols. But what do they mean, and which ones do you need to care about? Fret not – both clarity and help are available! In this blog, we’ll share tips on how to implement WebAuthn, as well as share news about java-webauthn-server library […]Read moreFIDO U2FFIDO2MFApasswordlesssecurity keyWebAuthn
  • YubiKeys protecting critical IT infrastructure in UkraineThe Russian invasion of Ukraine is a battle in both the physical and the digital world. On both sides, information warfare plays a more critical part of the battlefield than any other war in human history, with the biggest attack vector and threat being weak login credentials.  According to a Ukraine cybersecurity executive at a […]Read moreauthenticationcybersecuritygovernmentMFAYubiKey
  • The real reason legacy authentication doesn’t work for shared workstationsMost organizations struggle with legacy authentication, with passwords and mobile-based solutions a source of security risk, high IT cost, and frustrated users. However, for organizations with shared workstations and shared device environments, these pain points are only intensified. Shared workstations—common across industries such as healthcare, manufacturing, retail and hospitality, financial services, energy, utilities, oil and […]Read moreauthenticationlegacy authenticationMFAshared workstation
  • Shopping for cyber insurance? Six questions to ask before you call the insurerThe cyberthreat landscape has always been worrisome, but today there are many more CISOs noticing new gray hairs in the mirror given an anticipated uptick in cyber attacks from nation states and other bad actors. Ransomware attacks and other forms of account compromise continue to grace the news every month with  malicious actors – state-sponsored […]Read moreauthenticationcyber insuranceMFAphishing-resistant MFA
  • Q&A: Yubico’s Co-Founder & Chief Innovation Officer Jakob EhrensvärdIt’s not every day you get to hear a pioneer of internet security share why you and the rest of the world needs modern, reliable and easy-to-use Multi-Factor Authentication (MFA). If you want to understand phishing-resistant authentication and why it matters, there’s nobody better to ask than Jakob Ehrensvärd, Yubico’s co-founder. Jakob built his first […]Read moreabout YubicoauthenticationJakob EhrensvärdMFAphishing-resistant authenticationYubiKey