Blog

Stay up to date on company and partner news, product tips, and industry trends.

Home » Blog
Who we areWho we are What we doWhat we do Media assetsMedia assets Get in touchGet in touch BlogBlog Press ReleasesPress Releases
  • Improve your company’s cyber security training with top tips from a behavioral researcherToday marks the final stretch of National Cyber Security Awareness Month (NCSAM), and for the final week, we decided to sit down with Sal Aurigemma, PhD, Associate Professor of Computer Information Systems at the University of Tulsa, to get his take on enterprise security training.  As with many other things that have been impacted by COVID, […]Read moreenterprise securityphishingremote workers
  • Internet security myth-busters: Debunking 3 common misconceptions about two-factor authenticationOctober is National Cyber Security Awareness Month and this year, it comes at a time when we are using online services more than ever. The pandemic has forced many of us to almost entirely rely on our digital identities to work, shop, learn, and generally keep in touch, putting the resilience of authentication technologies to the test.  […]Read more2FApassword managersphishing
  • Responding to the rising wave of social engineering attacks against remote workersBy now, it’s clear the pandemic has provided perfect conditions for many types of social engineering attacks. We’ve seen plenty of reports and warnings from the FBI, CISA, Interpol, and other reputable organizations about the growth in coronavirus-related attacks, from spear-phishing to vishing, ransomware, and more, as the world adapts to remote working and its associated risks.  In many ways, social […]Read moredata breachenterprise securityphishingremote workers
  • Preserving democratic integrity and election security is a job for all of usAs we enter the final month of the 2020 U.S. presidential race, election security and fraud is top of mind for many. With the memory of the 2016 Podesta breach still fresh, we are a nation braced for cyber-attack impact.  Experts agree that, while countless security improvements have been made since 2016, we should expect more vigorous phishing attacks, data theft, […]Read moreelections and political campaignsgovernment
  • Yubico expands partnership with Infinigate into the UK and celebrates channel program growth across EMEA and APACThis year has been challenging and with an increase in remote workers, the need for organizations to protect their workforce from phishing attacks and credential theft has never been stronger. With remote work on the rise, and strict compliance guidelines being implemented, organisations are required to rapidly adapt best of breed security technologies, including modern […]Read moreabout YubicoYubiEnterprise
  • Minecraft or math lessons: which one could be the cause of your company’s next social engineering attack?Your child’s math lesson is a clear and present threat to your company data, and believe it or not, their Minecraft addiction could very well be the cause of your next enterprise-grade social engineering attack. In the past few weeks, millions of children returned to online learning, and simultaneously — and perhaps unknowingly — your company’s cyber […]Read moreenterprise securityphishingremote workers
  • How NIST and eIDAS revisions are shaping the future of e-identificationThis blog is co-authored by John Fontana, Standards Analyst at Yubico.  On both sides of the Atlantic, standards and regulations on electronic identification are being revised more or less simultaneously. In the United States, the National Institute of Standards and Technology (NIST) accepted public comments on its SP 800-63-3 Digital Identity Guidelines last month, which is on […]Read moreeidasgovernmentNIST
  • Our family is growing! Meet our newest member… the YubiKey 5C NFCToday is the day that many of our YubiFans have been waiting for — Yubico’s latest form factor, the YubiKey 5C NFC, is here! It’s the first security key featuring dual USB-C and near-field communication (NFC) connections in addition to multiple authentication protocols, including PIV for smart card login. As one of our most long-awaited and […]Read morenfcYubiKey 5C NFC
  • How YubiKeys are made: Security at scaleThe first YubiKey was manufactured in Sweden in 2008. A few years later, part of our team moved from Stockholm to California, and we expanded our production capabilities to this part to the US West coast. It was a conscious choice to manufacture our products in the two democratic countries that were close to our […]Read moreabout YubicoYubiKey
  • Build Passwordless offering with Microsoft Azure AD and YubiKeysCOVID-19 has disrupted the business norm and forced most organizations, including many Yubico partners, to adjust their security strategies. Our partners have had to recommend and implement the right technologies that will enable their customers, who are now managing expanded remote workforces, to achieve secure access to critical applications – all while maintaining business continuity.   […]Read moreMicrosoftpasswordless