Blog
Stay up to date on company and partner news, product tips, and industry trends.
-
Minecraft or math lessons: which one could be the cause of your company’s next social engineering attack? Your child’s math lesson is a clear and present threat to your company data, and believe it or not, their Minecraft addiction could very well be the cause of your next enterprise-grade social engineering attack. In the past few weeks, millions of children returned to online learning, and simultaneously — and perhaps unknowingly — your company’s cyber […] Read more enterprise security phishing remote workers -
How NIST and eIDAS revisions are shaping the future of e-identification This blog is co-authored by John Fontana, Standards Analyst at Yubico. On both sides of the Atlantic, standards and regulations on electronic identification are being revised more or less simultaneously. In the United States, the National Institute of Standards and Technology (NIST) accepted public comments on its SP 800-63-3 Digital Identity Guidelines last month, which is on […] Read more eidas government NIST -
Our family is growing! Meet our newest member… the YubiKey 5C NFC Today is the day that many of our YubiFans have been waiting for — Yubico’s latest form factor, the YubiKey 5C NFC, is here! It’s the first security key featuring dual USB-C and near-field communication (NFC) connections in addition to multiple authentication protocols, including PIV for smart card login. As one of our most long-awaited and […] Read more nfc YubiKey 5C NFC -
How YubiKeys are made: Security at scale The first YubiKey was manufactured in Sweden in 2008. A few years later, part of our team moved from Stockholm to California, and we expanded our production capabilities to this part to the US West coast. It was a conscious choice to manufacture our products in the two democratic countries that were close to our […] Read more about Yubico YubiKey -
Build Passwordless offering with Microsoft Azure AD and YubiKeys COVID-19 has disrupted the business norm and forced most organizations, including many Yubico partners, to adjust their security strategies. Our partners have had to recommend and implement the right technologies that will enable their customers, who are now managing expanded remote workforces, to achieve secure access to critical applications – all while maintaining business continuity. […] Read more Microsoft passwordless -
Why mobile-based MFA is not phishing resistant The need for phishing-resistant MFA has become more apparent in recent times. Some experts estimate that as of 2020, spear phishing is linked to upwards of 95 percent of all successful attacks against organizational networks in both the private and public sectors. 2021 also saw some of the largest security breaches ever, including the Colonial […] Read more MFA phishing -
New Yubico for Free Speech Program Arms Nonprofits with Strong Authentication 2020 continues to be a challenging year in many ways for all of us, but today, we’re proud to share some hopeful news — Yubico is introducing the Yubico for Free Speech Program, an initiative designed to defend digital privacy, online security, and free speech for at-risk individuals and nonprofit organizations. As of July 1, […] Read more about Yubico free speech -
Exploring clientDataJSON in WebAuthn Calling all developers! Today, we’re kicking off our first-ever post in our new technical blog series specifically designed for our developer community. Each month, we will be selecting a new technical topic to cover in more depth. To start our series, we dive into the clientDataJSON object as part of the Web Authentication or WebAuthn […] Read more developers WebAuthn Yubico Developer Program -
5 reasons why the government and other public sector agencies should care about WebAuthn Federal, state and local governments and other public sector agencies have important responsibilities that support a functioning community – everything from national security to public transit, public education, public safety, state parks, financial services, energy and power grids, and many more services are all tax funded and managed by the public sector. While these are […] Read more government state and local government WebAuthn -
4 reasons to consider a security-first approach to product development The internet is a powerful invention. It was originally built for collaboration, but it’s far surpassed the capabilities anyone could have expected, and has become a core function of society. As developers, we contribute to these incredible advancements every day, but it’s also our job to help protect and preserve the future of the internet. […] Read more data breach security