Blog
Stay up to date on company and partner news, product tips, and industry trends.
-
Laying the groundwork for continuous authentication Continuous authentication is an emerging concept—a future ‘nirvana’ state of security that would provide the capability to validate a user’s identity in real-time as they maneuver between systems, applications, and devices. In theory, continuous authentication solutions would use risk signals from a variety of monitoring sources to authenticate users, identify potential threats and proactively remediate […] Read more authentication FIDO U2F FIDO2 MFA phishing-resistant MFA zero trust -
Making sense of the alphabet soup within authentication and modern MFA terminology The vast majority of all cyberattacks start with stolen login passwords or other credentials. In a world that is moving to the cloud, our work, personal and government communication systems have become more accessible and vulnerable for anyone on the internet. Of all the different cyberattacks, credential phishing is by far the largest problem and […] Read more authentication MFA passwordless phishing-resistant MFA -
WebAuthn implementation: What’s what, why should you care and new updates from Yubico When it comes to WebAuthn, there’s certainly no shortage of acronyms or protocols. But what do they mean, and which ones do you need to care about? Fret not – both clarity and help are available! In this blog, we’ll share tips on how to implement WebAuthn, as well as share news about java-webauthn-server library […] Read more FIDO U2F FIDO2 MFA passwordless security key WebAuthn -
YubiKeys protecting critical IT infrastructure in Ukraine The Russian invasion of Ukraine is a battle in both the physical and the digital world. On both sides, information warfare plays a more critical part of the battlefield than any other war in human history, with the biggest attack vector and threat being weak login credentials. According to a Ukraine cybersecurity executive at a […] Read more authentication cybersecurity government MFA YubiKey -
The real reason legacy authentication doesn’t work for shared workstations Most organizations struggle with legacy authentication, with passwords and mobile-based solutions a source of security risk, high IT cost, and frustrated users. However, for organizations with shared workstations and shared device environments, these pain points are only intensified. Shared workstations—common across industries such as healthcare, manufacturing, retail and hospitality, financial services, energy, utilities, oil and […] Read more authentication legacy authentication MFA shared workstation -
Shopping for cyber insurance? Six questions to ask before you call the insurer The cyberthreat landscape has always been worrisome, but today there are many more CISOs noticing new gray hairs in the mirror given an anticipated uptick in cyber attacks from nation states and other bad actors. Ransomware attacks and other forms of account compromise continue to grace the news every month with malicious actors – state-sponsored […] Read more authentication cyber insurance MFA phishing-resistant MFA -
Q&A: Yubico’s Co-Founder & Chief Innovation Officer Jakob Ehrensvärd It’s not every day you get to hear a pioneer of internet security share why you and the rest of the world needs modern, reliable and easy-to-use Multi-Factor Authentication (MFA). If you want to understand phishing-resistant authentication and why it matters, there’s nobody better to ask than Jakob Ehrensvärd, Yubico’s co-founder. Jakob built his first […] Read more about Yubico authentication Jakob Ehrensvärd MFA phishing-resistant authentication YubiKey -
Passkeys and the future of modern authentication | Yubico A brief history on authentication A lot has happened in the world of authentication and security since we first introduced the YubiKey back in 2008. In this blog, we’ll review where we are in the world of open authentication standards, discuss the addition of the ‘passkey’ term, and share what the future holds for modern […] Read more modern authentication phishing-resistant MFA U2F -
White House declaration: act now for cybersecurity attack protection Last week, President Biden made a statement that couldn’t have been clearer in its message regarding cybersecurity attack protection to the private sector: “If you have not already done so, I urge our private sector partners to harden your cyber defenses immediately by implementing the best practices we have developed together over the last year […] Read more authentication Executive Order MFA phishing-resistant MFA YubiKey -
YubiKey as a smart card on iOS Certificate-based smart cards have been one of the most trusted and proven implementations of multi-factor authentication for over 20 years. There’s only one problem… the typical credit card-shaped smart card didn’t work well, if at all, on mobile devices without additional hardware and software. Today, smart cards come in many form factors, from a credit […] Read more 2FA smart card Yubico Authenticator YubiKey YubiKey 5 YubiKey FIPS Series