Blog

Stay up to date on company and partner news, product tips, and industry trends.
Thumbnail

Manufacturing cybersecurity to step up in response to threats of cyberattacks

Recent manufacturing crises such as the baby formula shortage and the global chip shortage demonstrate the profound impact of downtime and production issues. From the global pandemic to lockdowns in China, manufacturers are now being warned about the risk of cyberattacks from Russia.   Manufacturing is an emerging target for cyberattacks; production floors that were once

Thumbnail

YubiKeys are now available to purchase in the AWS Marketplace in the U.S.

Today, Yubico is excited to announce the launch of YubiKeys in the AWS Marketplace, providing a new and efficient way for AWS customers to purchase YubiKey solutions.  With the new collaboration, Yubico is now expanding our distribution options to meet customers where and how they chose to procure YubiKey solutions either directly from Yubico’s online

Thumbnail

Introducing Yubico Authenticator 6 for Desktop

Today we’re releasing the first public beta version of Yubico Authenticator 6 for Desktop. This new version has some big changes under the hood, so let me explain what they are and why we’re doing them. Or, if you’re just eager to try it out, skip to the bottom of this post and click on

Thumbnail

May 31, 2022

A Yubico FAQ about passkeys

In March, we published a blog called “YubiKeys, passkeys and the future of modern authentication” which took a look at the evolution of authentication from when we first introduced the YubiKey back in 2008, to where the industry is heading with the adoption and adaptation of WebAuthn/FIDO authentication. In recent months, there have been several

Thumbnail

Compliant PINs and MFA: Modern direction for staying secure

Entities within the US Federal Government are in the midst of a drastic change regarding how they approach the services they are using—moving away from traditional on-prem and proprietary systems to cloud services based on private platforms, like Azure and Amazon Web Services. However, the requirements for security remain the same regardless of the platform

Thumbnail

Laying the groundwork for continuous authentication

Continuous authentication is an emerging concept—a future ‘nirvana’ state of security that would provide the capability to validate a user’s identity in real-time as they maneuver between systems, applications, and devices. In theory, continuous authentication solutions would use risk signals from a variety of monitoring sources to authenticate users, identify potential threats and proactively remediate

Thumbnail

Making sense of the alphabet soup within authentication and modern MFA terminology

The vast majority of all cyberattacks start with stolen login passwords or other credentials. In a world that is moving to the cloud, our work, personal and government communication systems have become more accessible and vulnerable for anyone on the internet. Of all the different cyberattacks, credential phishing is by far the largest problem and