Blog

Stay up to date on company and partner news, product tips, and industry trends.

Home » Blog
Who we areWho we are What we doWhat we do Media assetsMedia assets Get in touchGet in touch BlogBlog Press ReleasesPress Releases
  • Minecraft or math lessons: which one could be the cause of your company’s next social engineering attack?Your child’s math lesson is a clear and present threat to your company data, and believe it or not, their Minecraft addiction could very well be the cause of your next enterprise-grade social engineering attack. In the past few weeks, millions of children returned to online learning, and simultaneously — and perhaps unknowingly — your company’s cyber […]Read moreenterprise securityphishingremote workers
  • How NIST and eIDAS revisions are shaping the future of e-identificationThis blog is co-authored by John Fontana, Standards Analyst at Yubico.  On both sides of the Atlantic, standards and regulations on electronic identification are being revised more or less simultaneously. In the United States, the National Institute of Standards and Technology (NIST) accepted public comments on its SP 800-63-3 Digital Identity Guidelines last month, which is on […]Read moreeidasgovernmentNIST
  • Our family is growing! Meet our newest member… the YubiKey 5C NFCToday is the day that many of our YubiFans have been waiting for — Yubico’s latest form factor, the YubiKey 5C NFC, is here! It’s the first security key featuring dual USB-C and near-field communication (NFC) connections in addition to multiple authentication protocols, including PIV for smart card login. As one of our most long-awaited and […]Read morenfcYubiKey 5C NFC
  • How YubiKeys are made: Security at scaleThe first YubiKey was manufactured in Sweden in 2008. A few years later, part of our team moved from Stockholm to California, and we expanded our production capabilities to this part to the US West coast. It was a conscious choice to manufacture our products in the two democratic countries that were close to our […]Read moreabout YubicoYubiKey
  • Build Passwordless offering with Microsoft Azure AD and YubiKeysCOVID-19 has disrupted the business norm and forced most organizations, including many Yubico partners, to adjust their security strategies. Our partners have had to recommend and implement the right technologies that will enable their customers, who are now managing expanded remote workforces, to achieve secure access to critical applications – all while maintaining business continuity.   […]Read moreMicrosoftpasswordless
  • Why mobile-based MFA is not phishing resistantThe need for phishing-resistant MFA has become more apparent in recent times. Some experts estimate that as of 2020, spear phishing is linked to upwards of 95 percent of all successful attacks against organizational networks in both the private and public sectors. 2021 also saw some of the largest security breaches ever, including the Colonial […]Read moreMFAphishing
  • New Yubico for Free Speech Program Arms Nonprofits with Strong Authentication2020 continues to be a challenging year in many ways for all of us, but today, we’re proud to share some hopeful news — Yubico is introducing the Yubico for Free Speech Program, an initiative designed to defend digital privacy, online security, and free speech for at-risk individuals and nonprofit organizations. As of July 1, […]Read moreabout Yubicofree speech
  • Exploring clientDataJSON in WebAuthnCalling all developers! Today, we’re kicking off our first-ever post in our new technical blog series specifically designed for our developer community. Each month, we will be selecting a new technical topic to cover in more depth. To start our series, we dive into the clientDataJSON object as part of the Web Authentication or WebAuthn […]Read moredevelopersWebAuthnYubico Developer Program
  • 5 reasons why the government and other public sector agencies should care about WebAuthnFederal, state and local governments and other public sector agencies have important responsibilities that support a functioning community – everything from national security to public transit, public education, public safety, state parks, financial services, energy and power grids, and many more services are all tax funded and managed by the public sector. While these are […]Read moregovernmentstate and local governmentWebAuthn
  • 4 reasons to consider a security-first approach to product developmentThe internet is a powerful invention. It was originally built for collaboration, but it’s far surpassed the capabilities anyone could have expected, and has become a core function of society. As developers, we contribute to these incredible advancements every day, but it’s also our job to help protect and preserve the future of the internet. […]Read moredata breachsecurity