Blog

Stay up to date on company and partner news, product tips, and industry trends.

Home » Blog
Who we areWho we are What we doWhat we do Media assetsMedia assets Get in touchGet in touch BlogBlog Press ReleasesPress Releases
  • The real reason legacy authentication doesn’t work for shared workstationsMost organizations struggle with legacy authentication, with passwords and mobile-based solutions a source of security risk, high IT cost, and frustrated users. However, for organizations with shared workstations and shared device environments, these pain points are only intensified. Shared workstations—common across industries such as healthcare, manufacturing, retail and hospitality, financial services, energy, utilities, oil and […]Read moreauthenticationlegacy authenticationMFAshared workstation
  • Shopping for cyber insurance? Six questions to ask before you call the insurerThe cyberthreat landscape has always been worrisome, but today there are many more CISOs noticing new gray hairs in the mirror given an anticipated uptick in cyber attacks from nation states and other bad actors. Ransomware attacks and other forms of account compromise continue to grace the news every month with  malicious actors – state-sponsored […]Read moreauthenticationcyber insuranceMFAphishing-resistant MFA
  • Q&A: Yubico’s Co-Founder & Chief Innovation Officer Jakob EhrensvärdIt’s not every day you get to hear a pioneer of internet security share why you and the rest of the world needs modern, reliable and easy-to-use Multi-Factor Authentication (MFA). If you want to understand phishing-resistant authentication and why it matters, there’s nobody better to ask than Jakob Ehrensvärd, Yubico’s co-founder. Jakob built his first […]Read moreabout YubicoauthenticationJakob EhrensvärdMFAphishing-resistant authenticationYubiKey
  • Passkeys and the future of modern authentication | YubicoA brief history on authentication A lot has happened in the world of authentication and security since we first introduced the YubiKey back in 2008. In this blog, we’ll review where we are in the world of open authentication standards, discuss the addition of the ‘passkey’ term, and share what the future holds for modern […]Read moremodern authenticationphishing-resistant MFAU2F
  • White House declaration: act now for cybersecurity attack protectionLast week, President Biden made a statement that couldn’t have been clearer in its message regarding cybersecurity attack protection to the private sector: “If you have not already done so, I urge our private sector partners to harden your cyber defenses immediately by implementing the best practices we have developed together over the last year […]Read moreauthenticationExecutive OrderMFAphishing-resistant MFAYubiKey
  • YubiKey as a smart card on iOSCertificate-based smart cards have been one of the most trusted and proven implementations of multi-factor authentication for over 20 years. There’s only one problem… the typical credit card-shaped smart card didn’t work well, if at all, on mobile devices without additional hardware and software.  Today, smart cards come in many form factors, from a credit […]Read more2FAsmart cardYubico AuthenticatorYubiKeyYubiKey 5YubiKey FIPS Series
  • Donating YubiKeys globally to those who need it most – YubicoWith current events unfolding daily around the world, the reality that everyone can be affected by impending cyberattacks has set in. Now, individuals around the world are wondering how to stay secure during tumultuous times like this (and in the future). So, what exactly are the best ways to secure oneself online and mitigate the […]Read moreauthenticationSecure It ForwardYubiKey
  • Celebrating Women in Tech on International Women’s Day – YubicoWith today being International Women’s Day, it’s the perfect time to recognize female pioneers in technology who have made monumental impacts in their chosen fields of healthcare, finance, internet security, and more. Now more than ever, it’s critical that businesses continue to invest in diversity, equity, inclusion, and belonging – simultaneously providing the support and […]Read morecybersecurityDE&Iwomen in technology
  • Security considerations for the top 8 mobile device-restricted workplacesWhen looking at enterprises and organizations, there are many different business scenarios that can be present when addressing secure authentication. Whether those be shared workstations, remote workers, or even privileged accounts, there is one in particular that introduces its own difficulties: mobile device-restricted workplaces.  It’s safe to say that there will always be workplaces which, […]Read moreauthenticationFIDOMFAmobile authenticationphishing-resistant MFAWebAuthn
  • Supply chain security in 2022The SolarWinds and Colonial Pipeline security breaches are two (of many) incidents that have made supply chain attacks go mainstream. The primary challenge for businesses is that supply chain defense isn’t easy given the hundreds, if not thousands of entry points that need to be monitored along the way. But there are best practices that […]Read morecybersecuritygovernmentMFAsupply chainYubiKey