Blog

Stay up to date on company and partner news, product tips, and industry trends.

Home » Blog
Who we areWho we are What we doWhat we do Media assetsMedia assets Get in touchGet in touch BlogBlog Press ReleasesPress Releases
  • Time Flies When Trying To Secure The InternetA year ago, I joined Yubico and wrote a blog with the headline “Welcome to the Future, It’s About to Get Really Interesting.” On reflection, perhaps that was an understatement. The past 12 months have seen unprecedented hacks on industry and government that have resulted in more than a billion stolen passwords and personal records. […]Read moreabout Yubico
  • Dropbox Adds Support For FIDO U2F, YubiKeysToday, cloud storage giant Dropbox announced to its more than 400 million users that it now supports FIDO U2F, including YubiKey security keys, for strong two-factor authentication. On the company’s blog, Dropbox said users now can protect their files with U2F-powered devices in addition to the current feature of a one-time code sent to a mobile […]Read moreFIDO U2F security keyWorks with YubiKey
  • U2F, OIDC mix widens authentication optionsThe Universal Second Factor (U2F) protocol from the FIDO Alliance is an interesting authentication story on its own, but even more so when coupled with another emerging standard called OpenID Connect. With the pair, you can solve more authentication challenges than either could on their own. U2F provides a way for users to authenticate to […]Read moreopenidU2F
  • A Milestone for Wireless U2FThe FIDO Universal 2nd Factor (U2F) protocol passed a significant milestone last month. They added new transport protocols that emphatically answer questions about support for mobile devices. Yubico is a leading contributor to the U2F specs, including the USB transport and the new specs for Bluetooth and Near Field Communication (NFC). We are now excited […]Read moremobile authenticationnfcU2F
  • Yubico Webinar: Google Talks Security Key, AppsGoogle is doubling down on authentication with a strong commitment to FIDO’s Universal Second Factor (U2F) protocol and Yubico’s Security Key as part of an expanding emphasis on security. The cloud computing giant joined Yubico on a live Webinar to continue a conversation entitled “Google for Work, FIDO U2F, and YubiKeys.” A recording of the […]Read moreGooglesecurity key
  • Innovative Projects Topped with YubiKing CrownsBreak out the trumpets. Lower the drawbridge. The YubiKings are here to claim their thrones! Today, Yubico is announcing the three winners of the months-long YubiKing contest, designed to discover who had mad enough skills to build the most innovative, creative and compelling solution around the YubiKey. We received and evaluated a pile of fantastic […]Read moreabout Yubico
  • Yubico CEO to EU: Open Standards Nurture TrustTrust has to be a cornerstone in order to protect the online identities of 500 million people doing business across borders, Yubico’s CEO and Founder, Stina Ehrensvard, told an exclusive crowd of 500 EU digital policy makers and industry representatives last week at Digital Assembly 2015 in Riga, Latvia. She held up a single YubiKey […]Read moreabout YubicoStina Ehrensvard
  • Cloud ID Summit Sharpens Focus on Future of IAM StandardsOne common theme across the talks at last week’s Cloud Identity Summit (CIS) revealed a desire to simplify and unify existing identity and access management (IAM) technologies and standards to build a pragmatic approach to modern identity. For years, authentication, authorization, single sign-on (SSO), federation, governance, risk, compliance, standards, etc., etc. have all been pointing […]Read moreidentity and access management
  • Hello, SSO. It’s me, authenticationThere’s a secret that single sign-on (SSO) never talks about. It’s called authentication. The SSO conversation starts without mentioning the assumption that the user is already logged in. A login that requires a password. Instead, SSO is quickly positioned to triumph over the dangers of weak and reused passwords. Many times, however, those same suspect passwords […]Read moreauthenticationphishingYubiKey
  • Ode to the value of Backup YubiKey(s)A few weeks ago, I was in my hotel and reached into my pocket to get my YubiKey. Without it, I can’t log into certain email, CMS or other systems without going through an involved IT administrative process. The key was gone. That is an instantaneous bad feeling, wiped away only by the backup YubiKey […]Read morespareYubiKey