Blog
Stay up to date on company and partner news, product tips, and industry trends.
-
Google Tools Boost Value of YubiKeys, FIDO U2F Deploying enterprise software or services that lack a management console is comparable to jumping out of a plane without a parachute. It’s just not done without damaging consequences. Today, Google delivered a parachute to all high-flying enterprises seeking managed two-factor authentication for their Google Drive for Work deployments. The company updated the Drive for Work Admin […] Read more Google U2F -
An Edge over the Bad Guys The one thing end-users don’t seem to have over hackers these days is an edge. Yubico is changing that. Today, we introduce a new key we’ve dubbed the YubiKey Edge. The goal is a cost-effective key with a collection of second-factor authentication options that guard against attacks on your accounts either via malware, phishing and other […] Read more FIDO U2F security key security key YubiKey Edge -
YubiKey, YubiHSM: Secret Weapons to Guard Secrets U.S. intelligence officials in 2013 said they planned to significantly reduce the number of individuals within their network with system administrator privileges. Those privileges gave administrators rights to view and move around any document. “U.S. intelligence has invited so many people into the secret realm,” an official told NBC News, that it left the organization overly exposed to threats […] Read more FIDO U2F security key YubiHSM -
Memoirs of a YubiKing While I’ve been an employee with Yubico for a little more than two years now, my history with the company dates back a bit further. And the YubiKing contest we announced today to discover the next innovative use of the YubiKey transports me back to that time. Before I was an employee, I was a […] Read more about Yubico -
Yubikey and the Emerging World of Wireless Mobile Authentication Wireless has become the de-facto connecting point for consumers today and even among enterprises, where employees expect to leave behind desktop Ethernet connections for wireless connectivity in board rooms, conference rooms and common areas. Apple makes this point emphatically with its new MacBook where the message is everything should be done without wires via technology […] Read more authentication mobile authentication U2F -
My Work Day Reflects YubiKey’s Flexibility I work as a developer at Yubico. Like a lot of developers these days I’m empowered to not only develop software, but to publish it and configure the servers it runs on. This means that I have access to many systems, to which I authenticate using different keys, requiring the flexibility of a YubiKey. The […] Read more authentication FIDO U2F security key U2F Works with YubiKey -
The Big Debate, 2048 vs. 4096, Yubico’s Position In Part 2, we got a better understanding of what an algorithm like RSA does and what the length of a key entails. Now, in Part 3, we can talk about the elephant in the room. Are 2048-bit keys useless? And are your documents completely insecure if you are using them? What are the pros […] Read more about Yubico -
Comparing Asymmetric Encryption Algorithms In Part 1 of our crypto blog, I briefly introduced the concept of asymmetric encryption algorithms and the general rule that the longer the key the better. Let’s take a deeper look at that logic here in Part 2. There are many asymmetric encryption algorithms, but lets focus on RSA, which is one of the […] Read more secure encryption -
Does Key Size Really Matter in Cryptography? One of the most interesting and useful aspects of the YubiKey NEO and NEO-n is that they can act as a smart card and come pre-loaded with a bunch of interesting applications, such as an implementation of OpenPGP Card. Many end-users like this functionality, but some question the key lengths. It’s an expected cryptographic question […] Read more cryptography OpenPGP YubiKey NEO -
A Crash Course in Cryptography To better understand asymmetric cryptography, you need knowledge of some basic concepts. For those that are not familiar with public-key cryptography, I will provide here a brief, stripped-down introduction to the topic. In asymmetric or public-key encryption there are two main players: the encryption algorithm itself (RSA, ECC, ElGamal, …) and a cryptographic key pair (there […] Read more cryptography developers FIDO U2F security key