Blog

Stay up to date on company and partner news, product tips, and industry trends.

Home » Blog
Who we areWho we are What we doWhat we do Media assetsMedia assets Get in touchGet in touch BlogBlog Press ReleasesPress Releases
  • Donating YubiKeys globally to those who need it most – YubicoWith current events unfolding daily around the world, the reality that everyone can be affected by impending cyberattacks has set in. Now, individuals around the world are wondering how to stay secure during tumultuous times like this (and in the future). So, what exactly are the best ways to secure oneself online and mitigate the […]Read moreauthenticationSecure It ForwardYubiKey
  • Celebrating Women in Tech on International Women’s Day – YubicoWith today being International Women’s Day, it’s the perfect time to recognize female pioneers in technology who have made monumental impacts in their chosen fields of healthcare, finance, internet security, and more. Now more than ever, it’s critical that businesses continue to invest in diversity, equity, inclusion, and belonging – simultaneously providing the support and […]Read morecybersecurityDE&Iwomen in technology
  • Security considerations for the top 8 mobile device-restricted workplacesWhen looking at enterprises and organizations, there are many different business scenarios that can be present when addressing secure authentication. Whether those be shared workstations, remote workers, or even privileged accounts, there is one in particular that introduces its own difficulties: mobile device-restricted workplaces.  It’s safe to say that there will always be workplaces which, […]Read moreauthenticationFIDOMFAmobile authenticationphishing-resistant MFAWebAuthn
  • Supply chain security in 2022The SolarWinds and Colonial Pipeline security breaches are two (of many) incidents that have made supply chain attacks go mainstream. The primary challenge for businesses is that supply chain defense isn’t easy given the hundreds, if not thousands of entry points that need to be monitored along the way. But there are best practices that […]Read morecybersecuritygovernmentMFAsupply chainYubiKey
  • Privileged Access Management at CERN: Q&A with Dr. Stefan LüdersIn an era of increasing cyber attacks, how do you balance the desire for unrestricted research freedom against the need to protect that research from cyber threats? This is the challenge faced by CERN, leaders in the scientific research community. Their solution? Provide a clear articulation of what constitutes privileged data, and create flexible security […]Read moreauthenticationMFAphishing-resistant MFAprivileged access manegementprivileged usersYubiKey
  • Who can CISOs trust? Sharing information is both essential and a professional hazardPresident Biden’s recent executive order on cybersecurity calls on the public sector to work with private companies to create more secure environments and emphasizes the importance of sharing information as a best practice. Many of us may see “information sharing” as a synonym for risk or liability as information sharing requires a lot of caution. […]Read moreCISOcybersecuritygovernmentleadership
  • Google Chrome U2F API decommission: What the change means for your users and how to prepareWith advancement often comes change. Some changes are exciting, like providing new features and broader support, while other changes can be a minimal bump in the road or, in extreme cases, cause adverse effects on end users. With Yubico’s commitment to keeping our customers updated on the latest in changes to security protocols, we wanted […]Read moreGoogleGoogle ChromeMFAU2FWebAuthn
  • Salesforce is requiring MFA: Why this matters and what you can doAs sophisticated cyberattacks continue their relentless pursuit towards SMBs and enterprises, companies must prioritize improvements to their cybersecurity infrastructure to better secure their customers, employees, and partners. Username and passwords no longer provide adequate security against the ever evolving landscape of cyberattacks.   Late last year, Salesforce took a strong and decisive stance, announcing that beginning […]Read moreauthenticationFIDOFIDO U2FMFAYubiEnterpriseYubiKey
  • Yubico’s top information security recommendations for 2022Last  week, we shared a look back at 2021, which experienced an increase in the number of high profile security breaches, many involving devastating ransomware attacks. Attackers preyed on traditionally softer targets like hospitals, schools, and local governments, in addition to the continued focus on the supply chain. Although the root cause for many of […]Read moreauthenticationgovernmentMFAphishingprivacyzero trust
  • 2021: Both challenging and promising for cyber security2021 was a challenging, yet promising year for cyber security. This past year, we saw critical infrastructure, which we may have taken for granted in the past, breached and disrupted. My father, who lives in Sweden, could not buy food in his local grocery store, and coworkers and friends on the east coast in the US […]Read moreMFAmultifactor authenticationpasswordlessphishingYubiKey