Blog

Stay up to date on company and partner news, product tips, and industry trends.

Home » Blog
Who we areWho we are What we doWhat we do Media assetsMedia assets Get in touchGet in touch BlogBlog Press ReleasesPress Releases
  • World Press Freedom Day: Uplifting security stories from the fieldToday, Yubico celebrates World Press Freedom Day, a day committed to supporting a mission that we believe in whole-heartedly: protecting journalistic voices across the globe. Without the foundational pieces of free speech, democracy, or an open internet, our mission of making the internet a safer place will have no impact. So, to do our part […]Read morefree speechpress
  • How will authentication standards evolve in 2021 and beyond?Authentication standards development is like a slow-moving, winding river. It often takes years of dedicated work to reach new milestones, yet it feeds the entire security ecosystem and sustains digital workflow safety throughout the enterprise. While the benefits of this river are often invisible to the end-user, CISOs and developers are thinking about the river’s […]Read moreFIDO2PIVstrong authenticationWebAuthn
  • Multi-factor authentication adoption – Yubico and 451 ResearchWithin a few days of last year’s pandemic shut down in March, the business world knew something had permanently changed about the workplace. Millions of workers flooded out of traditional office environments, perhaps never to return. Security professionals worldwide scrambled to make transitioning to remote work painless, but in many cases they weren’t prepared for […]Read moremultifactor authenticationpasswordless
  • Yubico Q&A with John Kindervag, creator of Zero Trust and Senior Vice President at ON2ITZero Trust has truly come of age in the last 12 months, but there are misconceptions relating to what it is, where to start on the journey, and how organizations can achieve a Zero Trust environment. To further explore this topic, we recently sat down with John Kindervag, the creator of Zero Trust and current […]Read morezero trust
  • A security tool that nobody wants to use – YubicoTo continue our effort to peel back the layers on the journey to passwordless, Yubico talked with former Navy intelligence officer and University of Tulsa professor, Sal Aurigemma, about his research in the behavioral information security field. Professor Aurigemma focuses on end-user experiences and adoption rates of authentication technologies. He regularly runs field experiments with […]Read moreMFApasswordless
  • Cloud vs. On-Prem: Why on-prem can bring your next data breachMost CISOs and IT teams spend their time asking themselves “when”, not “if”, they will be the next company to suffer a data breach. And rightfully so. The frequency of data breaches is skyrocketing, with no sign of slowing down.  To help quantify the problem, recent research from Canalys shows that there were more records […]Read moredata breachdigital transformationidentity and access management
  • Discover passwordless with Okta and YubiKey at Oktane21Okta’s premier identity conference, Oktane21, is taking place virtually on April 6-8, and Yubico is once again a proud sponsor. This year, Yubico will highlight our continued partnership with Okta and showcase the YubiKey as the key to trust.  Okta Adaptive MFA and the phishing-resistant YubiKey allow organizations to quickly and securely deploy strong multi-factor […]Read moreOktapasswordless
  • Yubico announces general availability of next-generation Android and iOS SDKsYubico is committed to enabling YubiKey integrations for all of our technology partners and enterprise customers with the least amount of friction and time-to-market as possible. With this goal in mind, we are very excited to announce the public general availability of our Android and iOS SDKs that went into public beta in December last […]Read moreandroidios authentication
  • New administration and Covid-19 aftermath surges demand for next-gen security in public sector2021 marks the year that two game-changing events have put onboarding remote employees and strong authentication on the radar for many public sector agency heads. Since March 2020 most government workers, like everyone else, have been forced to work remotely in systems that were not designed for secure work-from-home situations. IT executives scrambled to find […]Read morePublic Sector
  • Top 10 security regulations you need to know about in the U.S. and EUCompliance has always been part of routine planning and development for security experts in the enterprise. But recent headline-grabbing attacks like the SolarWinds incident may have pushed compliance much higher up the priority list. It’s difficult to track the dizzying array of regulations on both sides of the pond and what they require, so we’ve […]Read morecompliancegovernment