Blog

Stay up to date on company and partner news, product tips, and industry trends.

Home » Blog
Who we areWho we are What we doWhat we do Media assetsMedia assets Get in touchGet in touch BlogBlog Press ReleasesPress Releases
  • person logging into laptop using YubiKey and Microsoft Azure ADGo Passwordless with YubiKey and Microsoft Azure Active DirectoryToday, Yubico celebrates an important milestone in the evolution of modern authentication. We are excited to report that YubiKey passwordless authentication is now generally available to Microsoft’s Azure Active Directory (Azure AD) users, a critical step toward achieving better security without compromising usability. Nearly three years ago, Yubico started on this journey with Microsoft and […]Read moreMicrosoft 365Microsoft Azurepasswordless
  • How a biopharmaceutical company solved NFC authenticationOne of the greatest things about the YubiKey is that it can be used in virtually any environment and by any user. While we all know about the common user experience of plugging in your YubiKey then touching to authenticate, we often hear unique stories from our customers about how they used creativity to address […]Read morehealthcarenfc
  • laptop, YubiKey 5C NFC, cell phoneSeparating fact from fiction in your journey to passwordless authenticationSay the word “passwordless” to a room full of security professionals and you will get a range of reactions, from a wry smile to a walk-out. That’s because the information security community knows that “passwordless” is a loaded term, and the industry is filled with differing and contradictory positions on the topic.  The purpose of […]Read morefeaturedpasswordless
  • Yubico for Free Speech Spotlight: RedesAyudaLess than one year ago, Yubico launched a 20:1 donation-led program, where we pledged to donate 1 YubiKey for every 20 YubiKeys sold on Yubico.com. The program, called Yubico for Free Speech, is dedicated to securing organizations, their constituents, and at-risk individuals who are focused on protecting free speech and journalism, defending human rights, and upholding democratic […]Read morefeaturedfree speech
  • Why strong authentication for every employee makes senseBy now, it’s an all-too-familiar routine… Step 1: Organization suffers an expensive and embarrassing security breach.  Step 2: Organization hastily introduces multi-factor authentication (or steps up its efforts to mandate its usage).  Oftentimes, it takes a breach to make organizations fully embrace strong authentication. But why? We know that usernames and passwords alone cannot provide sufficient security, and we know that SMS two-factor authentication (2FA) has been deprecated time […]Read morefeaturedmultifactor authenticationsecuritystrong authentication
  • Why 3 government agencies are relying on hardware-based MFA with YubiKeysAmerica’s government is under attack. To put it more accurately, its governments are under attack, all the time, at every level — federal, state, and local — from opportunistic scammers, sophisticated cybercriminals, and even state actors. We’ve all seen the stories about intelligence services stealing political emails, snooping into election systems, and even penetrating the US power grid. But those are just […]Read morefeaturedfederal governmentgovernmentstate and local government
  • Wrapping up 2020: A year where technology and internet security prevailedNever has the world been more dependent on the internet, and never has it been more attacked than in 2020. In fact, it proved to be a year where trust in many of our systems was challenged. Yet I remain an eternal optimist and believe that we can transform the hard lessons learned in 2020 […]Read morephishingsecurityWebAuthnyubico.comYubiHSM
  • 4 things ‘Among Us’ can teach professionals about authenticationYou’re making good progress on this task. One more data upload and then you’re out of here. But right before you can complete the upload, a klaxon blares. There’s been an attack! Time to head to the meeting room for the usual finger-pointing and scapegoating before the team decides who to jettison from the ship. […]Read moreauthenticationcybersecurityremote workerssecurity
  • Lessons from the SolarWinds incidentLast week, a large and expertly run espionage operation was made public — one that began no later than October 2019, and which had been actively exploiting victims since at least early 2020. This incident is particularly interesting for several reasons: for the breadth of sensitive global government and industry targets, for misuse of a […]Read moreidentity and access managementNISTsecurityWebAuthn