Blog

Stay up to date on company and partner news, product tips, and industry trends.

Home » Blog
Who we areWho we are What we doWhat we do Media assetsMedia assets Get in touchGet in touch BlogBlog Press ReleasesPress Releases
  • Hello, SSO. It’s me, authenticationThere’s a secret that single sign-on (SSO) never talks about. It’s called authentication. The SSO conversation starts without mentioning the assumption that the user is already logged in. A login that requires a password. Instead, SSO is quickly positioned to triumph over the dangers of weak and reused passwords. Many times, however, those same suspect passwords […]Read moreauthenticationphishingYubiKey
  • Ode to the value of Backup YubiKey(s)A few weeks ago, I was in my hotel and reached into my pocket to get my YubiKey. Without it, I can’t log into certain email, CMS or other systems without going through an involved IT administrative process. The key was gone. That is an instantaneous bad feeling, wiped away only by the backup YubiKey […]Read morespareYubiKey
  • YubiKeys Earn FIDO Certified LabelInteroperability is king and today the FIDO Alliance announced its FIDO Certified program and a list of 31 products that have passed conformance and interoperability testing. The three YubiKeys that support FIDO’s Universal 2nd Factor (U2F) protocol ­­– NEO, Edge and Security Key – are now certified and part of this important maturation in FIDO’s design. […]Read moreFIDOFIDO Alliance
  • U2F, Google, Yubico Lead Authentication MakeoverThe authentication landscape has been altered and evidence of that can be seen among a trio of front runners: FIDO U2F, Google and Yubico. This week, Yubico laid out the details during a live webinar entitled “FIDO U2F, Google Drive for Work and YubiKey,” that is now available for playback online. The in-depth discussion starts […]Read moreGoogleU2F
  • YubiKey NEO OpenPGP Security BugYubico recently learned of a security issue with the OpenPGP Card applet project that is used in the YubiKey NEO. If you are not using OpenPGP, or have the OpenPGP applet version 1.0.10 or later, this vulnerability does not apply to you. The OpenPGP Card applet defect was inherited from the open-source software project “javacardopenpgp.” The […]Read moreOpenPGPYubiKey NEO
  • Google Tools Boost Value of YubiKeys, FIDO U2FDeploying enterprise software or services that lack a management console is comparable to jumping out of a plane without a parachute. It’s just not done without damaging consequences. Today, Google delivered a parachute to all high-flying enterprises seeking managed two-factor authentication for their Google Drive for Work deployments. The company updated the Drive for Work Admin […]Read moreGoogleU2F
  • An Edge over the Bad GuysThe one thing end-users don’t seem to have over hackers these days is an edge. Yubico is changing that. Today, we introduce a new key we’ve dubbed the YubiKey Edge. The goal is a cost-effective key with a collection of second-factor authentication options that guard against attacks on your accounts either via malware, phishing and other […]Read moreFIDO U2F security keysecurity keyYubiKey Edge
  • YubiKey, YubiHSM: Secret Weapons to Guard SecretsU.S. intelligence officials in 2013 said they planned to significantly reduce the number of individuals within their network with system administrator privileges. Those privileges gave administrators rights to view and move around any document. “U.S. intelligence has invited so many people into the secret realm,” an official told NBC News, that it left the organization overly exposed to threats […]Read moreFIDO U2F security keyYubiHSM
  • Memoirs of a YubiKingWhile I’ve been an employee with Yubico for a little more than two years now, my history with the company dates back a bit further. And the YubiKing contest we announced today to discover the next innovative use of the YubiKey transports me back to that time. Before I was an employee, I was a […]Read moreabout Yubico
  • Yubikey and the Emerging World of Wireless Mobile AuthenticationWireless has become the de-facto connecting point for consumers today and even among enterprises, where employees expect to leave behind desktop Ethernet connections for wireless connectivity in board rooms, conference rooms and common areas. Apple makes this point emphatically with its new MacBook where the message is everything should be done without wires via technology […]Read moreauthenticationmobile authenticationU2F