Blog
Stay up to date on company and partner news, product tips, and industry trends.
-
Passkeys and the future of modern authentication | Yubico A brief history on authentication A lot has happened in the world of authentication and security since we first introduced the YubiKey back in 2008. In this blog, we’ll review where we are in the world of open authentication standards, discuss the addition of the ‘passkey’ term, and share what the future holds for modern […] Read more modern authentication phishing-resistant MFA U2F -
White House declaration: act now for cybersecurity attack protection Last week, President Biden made a statement that couldn’t have been clearer in its message regarding cybersecurity attack protection to the private sector: “If you have not already done so, I urge our private sector partners to harden your cyber defenses immediately by implementing the best practices we have developed together over the last year […] Read more authentication Executive Order MFA phishing-resistant MFA YubiKey -
YubiKey as a smart card on iOS Certificate-based smart cards have been one of the most trusted and proven implementations of multi-factor authentication for over 20 years. There’s only one problem… the typical credit card-shaped smart card didn’t work well, if at all, on mobile devices without additional hardware and software. Today, smart cards come in many form factors, from a credit […] Read more 2FA smart card Yubico Authenticator YubiKey YubiKey 5 YubiKey FIPS Series -
Donating YubiKeys globally to those who need it most – Yubico With current events unfolding daily around the world, the reality that everyone can be affected by impending cyberattacks has set in. Now, individuals around the world are wondering how to stay secure during tumultuous times like this (and in the future). So, what exactly are the best ways to secure oneself online and mitigate the […] Read more authentication Secure It Forward YubiKey -
Celebrating Women in Tech on International Women’s Day – Yubico With today being International Women’s Day, it’s the perfect time to recognize female pioneers in technology who have made monumental impacts in their chosen fields of healthcare, finance, internet security, and more. Now more than ever, it’s critical that businesses continue to invest in diversity, equity, inclusion, and belonging – simultaneously providing the support and […] Read more cybersecurity DE&I women in technology -
Security considerations for the top 8 mobile device-restricted workplaces When looking at enterprises and organizations, there are many different business scenarios that can be present when addressing secure authentication. Whether those be shared workstations, remote workers, or even privileged accounts, there is one in particular that introduces its own difficulties: mobile device-restricted workplaces. It’s safe to say that there will always be workplaces which, […] Read more authentication FIDO MFA mobile authentication phishing-resistant MFA WebAuthn -
Supply chain security in 2022 The SolarWinds and Colonial Pipeline security breaches are two (of many) incidents that have made supply chain attacks go mainstream. The primary challenge for businesses is that supply chain defense isn’t easy given the hundreds, if not thousands of entry points that need to be monitored along the way. But there are best practices that […] Read more cybersecurity government MFA supply chain YubiKey -
Privileged Access Management at CERN: Q&A with Dr. Stefan Lüders In an era of increasing cyber attacks, how do you balance the desire for unrestricted research freedom against the need to protect that research from cyber threats? This is the challenge faced by CERN, leaders in the scientific research community. Their solution? Provide a clear articulation of what constitutes privileged data, and create flexible security […] Read more authentication MFA phishing-resistant MFA privileged access manegement privileged users YubiKey -
Who can CISOs trust? Sharing information is both essential and a professional hazard President Biden’s recent executive order on cybersecurity calls on the public sector to work with private companies to create more secure environments and emphasizes the importance of sharing information as a best practice. Many of us may see “information sharing” as a synonym for risk or liability as information sharing requires a lot of caution. […] Read more CISO cybersecurity government leadership -
Google Chrome U2F API decommission: What the change means for your users and how to prepare With advancement often comes change. Some changes are exciting, like providing new features and broader support, while other changes can be a minimal bump in the road or, in extreme cases, cause adverse effects on end users. With Yubico’s commitment to keeping our customers updated on the latest in changes to security protocols, we wanted […] Read more Google Google Chrome MFA U2F WebAuthn