Blog

Stay up to date on company and partner news, product tips, and industry trends.

Home » Blog
Who we areWho we are What we doWhat we do Media assetsMedia assets Get in touchGet in touch BlogBlog Press ReleasesPress Releases
  • Yubico proposes WebAuthn protocol extension to simplify backup security keysOne of the most common questions people have about YubiKeys, and security keys in general, is: “What if I lose my key?”  While WebAuthn and FIDO2, the open standards for security key authentication, promise strong, phishing-resistant and — perhaps most importantly — easy-to-use multi-factor authentication, this question still remains. As of today, there are no answers that […]Read morecybersecuritysecurity keyWebAuthn
  • Getting a biometric security key rightToday, we are excited to share some updates regarding the next highly-anticipated members of our YubiKey family: the upcoming YubiKey Bio in both USB-A and USB-C form factors. The YubiKey Bio will be the first product to introduce biometric capabilities (in addition to PIN) to our portfolio of YubiKeys.  Yubico has been considering adding biometrics […]Read morebiometricsFIDO U2F security keysecurity keyYubiKey Bio
  • The Ultimate YubiKey Experience pack, and your chance to win one!We just launched the new Ultimate YubiKey Experience pack, designed for anyone who wants to use a variety of YubiKey 5 Series form factors. The new pack delivers our five most popular devices, and also the addition of an unboxing experience like never before, complete with a ‘Y’ book featuring extensive details about Yubico, our mission, […]Read moreExperience Packform factorYubiKey
  • Improve your company’s cyber security training with top tips from a behavioral researcherToday marks the final stretch of National Cyber Security Awareness Month (NCSAM), and for the final week, we decided to sit down with Sal Aurigemma, PhD, Associate Professor of Computer Information Systems at the University of Tulsa, to get his take on enterprise security training.  As with many other things that have been impacted by COVID, […]Read moreenterprise securityphishingremote workers
  • Internet security myth-busters: Debunking 3 common misconceptions about two-factor authenticationOctober is National Cyber Security Awareness Month and this year, it comes at a time when we are using online services more than ever. The pandemic has forced many of us to almost entirely rely on our digital identities to work, shop, learn, and generally keep in touch, putting the resilience of authentication technologies to the test.  […]Read more2FApassword managersphishing
  • Responding to the rising wave of social engineering attacks against remote workersBy now, it’s clear the pandemic has provided perfect conditions for many types of social engineering attacks. We’ve seen plenty of reports and warnings from the FBI, CISA, Interpol, and other reputable organizations about the growth in coronavirus-related attacks, from spear-phishing to vishing, ransomware, and more, as the world adapts to remote working and its associated risks.  In many ways, social […]Read moredata breachenterprise securityphishingremote workers
  • Preserving democratic integrity and election security is a job for all of usAs we enter the final month of the 2020 U.S. presidential race, election security and fraud is top of mind for many. With the memory of the 2016 Podesta breach still fresh, we are a nation braced for cyber-attack impact.  Experts agree that, while countless security improvements have been made since 2016, we should expect more vigorous phishing attacks, data theft, […]Read moreelections and political campaignsgovernment
  • Yubico expands partnership with Infinigate into the UK and celebrates channel program growth across EMEA and APACThis year has been challenging and with an increase in remote workers, the need for organizations to protect their workforce from phishing attacks and credential theft has never been stronger. With remote work on the rise, and strict compliance guidelines being implemented, organisations are required to rapidly adapt best of breed security technologies, including modern […]Read moreabout YubicoYubiEnterprise
  • Minecraft or math lessons: which one could be the cause of your company’s next social engineering attack?Your child’s math lesson is a clear and present threat to your company data, and believe it or not, their Minecraft addiction could very well be the cause of your next enterprise-grade social engineering attack. In the past few weeks, millions of children returned to online learning, and simultaneously — and perhaps unknowingly — your company’s cyber […]Read moreenterprise securityphishingremote workers
  • How NIST and eIDAS revisions are shaping the future of e-identificationThis blog is co-authored by John Fontana, Standards Analyst at Yubico.  On both sides of the Atlantic, standards and regulations on electronic identification are being revised more or less simultaneously. In the United States, the National Institute of Standards and Technology (NIST) accepted public comments on its SP 800-63-3 Digital Identity Guidelines last month, which is on […]Read moreeidasgovernmentNIST