Blog

Stay up to date on company and partner news, product tips, and industry trends.

Home » Blog
Who we areWho we are What we doWhat we do Media assetsMedia assets Get in touchGet in touch BlogBlog Press ReleasesPress Releases
  • Yubico Announces YubiKey for Lightning Partner Preview ProgramToday, Yubico is happy to announce the launch of our YubiKey for Lightning Partner Preview Program, the next phase of the YubiKey for Lightning Private Preview Program announced earlier this year. This is an exciting step forward for both Yubico and the Works with YubiKey ecosystem. With the launch of the Partner Preview Program, our […]Read moreLightningWorks with YubiKeyYubiKey 5ci
  • 1Password rolls out WebAuthn, and enhanced YubiKey supportYubico has been a major contributor to the development of open standards for authentication from the initial development of the U2F specification to the latest W3C approved WebAuthn. As we see more services upgrade to modern authentication standards, we can’t help but share in the excitement. We are thrilled to share that 1Password, a password […]Read more2FApassword managersWebAuthnYubico Authenticator
  • 5 Reasons to Upgrade Your Web Authentication to WebAuthnAuthentication has made significant progress over the past five years. It has matured beyond passwords with the introduction of a variety of two-factor authentication methods, and most recently, we have the advent of passwordless logins with WebAuthn, the new global standard for web authentication. WebAuthn now sets a new bar for user authentication and is […]Read moreenterprise securitypasswordlessWebAuthn
  • WebAuthn wins support in Safari, Twitter, Coinbase and hundreds of more services“And the winner is… WebAuthn!” A few weeks ago at the European Identity Conference (EIC) in Munich, WebAuthn won the award for Best Future Technology and Standard Project. As a co-chair of the W3C WebAuthn working group and lead authors of FIDO U2F/FIDO2, Yubico was invited to receive the award on behalf of all who […]Read moreWebAuthn
  • YubiKey Summer Showcase: InfoSecurity, Gartner Security & Risk, IdentiverseWe’re gearing up for a busy and exciting month here at Yubico. We have a full event schedule, a handful of speaking sessions on trending security topics, and we will be showcasing many of our Works with YubiKey partners. In other words, you won’t want to miss this. If you are looking to integrate the […]Read moreYubiStyle
  • The YubiKey as the WebAuthn Root of TrustThe new web authentication standard, WebAuthn, that was recently announced by W3C, is rapidly gaining adoption by leading platforms and services. WebAuthn is an evolution of the FIDO U2F standard, spearheaded by Yubico and Google, and successfully deployed since 2014 by millions of users with YubiKey security keys. Yubico helped to create WebAuthn to extend […]Read moreWebAuthnYubiKey
  • YubiHSM 2 Now Compatible with EJBCA from PrimeKeyThe YubiHSM 2, the world’s smallest hardware security module from Yubico, is now compatible with EJBCA software for a range of public key infrastructure (PKI) use cases. Available for all YubiHSM 2.1 and newer devices, Yubico’s updated Setup Tool, which adds support for PrimeKey EJBCA, is accessible in our latest YubiHSM 2 open source software […]Read moreHardware Security Moduleopen-sourceYubiHSM 2
  • Login for Window Application Available in Public Review – YubicoEvery day, YubiKey users are protecting access to their data in cloud services like Gmail, Dropbox, and password managers, but these very same people also need to protect access to desktop and laptop computers as well. Thanks to the multi-protocol capabilities of the YubiKey, they can. The YubiKey can be used to log in to […]Read morewindows
  • Yubico Releases the 2019 State of Password and Authentication Security Behaviors ReportIn conjunction with Data Privacy Day, Yubico is releasing today new research in a report entitled, The 2019 State of Password and Authentication Security Behaviors Report, conducted by Ponemon Institute. The findings reveal that despite a growing understanding of security best practices, user behavior is still falling short. The problem? Passwords continue to trip up […]Read more2FAauthenticationpasswordlesssecurity