Blog

Stay up to date on company and partner news, product tips, and industry trends.

Home » Blog
Who we areWho we are What we doWhat we do Media assetsMedia assets Get in touchGet in touch BlogBlog Press ReleasesPress Releases
  • Works with YubiKey Spotlight: How Yubico works with partners to Secure Our WorldOctober is National Cybersecurity Awareness Month (NCSAM), a dedicated month for the public and private sectors to work together to raise awareness about the importance of cybersecurity and providing individuals and organizations with the resources they need to stay safe from cyber threats. ‘Secure Our World’ is the theme for this year’s NCSAM, and is […]Read moreCybersecurity Awareness MonthWorks with YubiKeywwyk
  • Yubico FIDO Pre-reg is here: What secure, fast passwordless onboarding and account recovery at scale means for your business and end usersToday, we’re excited to announce a new first-to-market service available with YubiEnterprise Subscription called Yubico FIDO Pre-reg, which will transform passwordless onboarding for enterprises and their new employees from day one, and offers secure and fast account recovery and reset experiences as well. Organizations will be able to rapidly establish strong protection against phishing and […]Read moreFIDO Pre-regOktaYubiEnterprise ServicesYubiEnterprise Subscription
  • How retail and hospitality can protect themselves from increased cyber attacksEvery industry in the world is vulnerable to phishing and other cyber attacks, but retail and hospitality rank as some of the most high-value targets for hackers looking for personal identifiable information (PII) and payment card information (PCI). These two industries are often ranked among the top three most vulnerable industries, right behind financial institutions. […]Read morecase studyHyattretail and hospitality
  • Q&A with CEO Mattias Danielsson: Yubico’s next stage of growth as a public company and what investors can expectToday marks an exciting, historic day in Yubico’s history: the company is now publicly traded under the ticker symbol YUBICO on Nasdaq First Growth North Market in Stockholm. As the cyber threat landscape continues to evolve rapidly through increasingly sophisticated attacks like phishing, the need for phishing-resistant MFA with the YubiKey are at an all-time […]Read moreInvestorsQ&Athought leadership
  • Five foundations to cybersecurity defense mitigating 90% of breachesDuring my 16 years in the cybersecurity industry, and after discussions with numerous CISOs and cyber security experts, they all agree that there are five basic steps all organizations can take to mitigate over 90% of all cyber breaches1.  Just like cars were not initially designed for safety, the internet was not designed for security. […]Read morebest practice guide
  • Okta + Yubico: Better togetherModern cybersecurity needs to be phishing-resistant, but it also needs to incorporate a great user experience for employees, IT teams and customers. We know traditional authentication methods are perceived as user-friendly, but they are not secure and vulnerable to most attacks  – in fact, 59% of people still rely on username and password to authenticate […]Read moreOktaPartner Program
  • Works with YubiKey Spotlight: How Yubico works with industry leaders who share the commitment to strong authenticationAs the cyber threat landscape continues to evolve rapidly in the form of more sophisticated attacks like phishing and ransomware, the need for industry collaborations and partnerships are more critical than ever to help businesses and consumers stay secure online. We first launched the Works with YubiKey (WWYK) program in 2018 with this in mind […]Read moreWorks with YubiKeywwyk
  • What CISA and NSA’s ESF guidance means for critical infrastructure cybersecurityThe Cybersecurity Infrastructure Security Agency (CISA) and the National Security Agency (NSA) recently collaborated to produce an important new document, “Identity and Access Management: Recommended Best Practices for Administrators.” Part of the Enduring Security Framework (ESF), it presents a distillation of identity access management (IAM) and cybersecurity guidance put forth by CISA to date, based […]Read moreCISAcritical infrastructureESFgovernmentNIST
  • YubiEnterprise Services reaches a new milestone with SOC 2 Type 2 attestation reportOver the years, we have witnessed malicious actors taking aim at organizational supply chains, seeking to exploit the weakest link in enterprises. Increasingly, passwords and even legacy multi-factor authentication (MFA) methods are being swiftly bypassed by phishing and ransomware – resulting in significant financial and reputational damage to organizations, as well as severe threats to […]Read moreSOC 2 Type 2YubiEnterprise DeliveryYubiEnterprise ServicesYubiEnterprise Subscription
  • key and devicesThe six biggest misconceptions about Zero Trust Architecture (ZTA)We talk a lot about Zero Trust architectures (ZTAs) at Yubico because we’d like to see every customer embrace its guiding principle: no user, whether they are authenticating from inside or outside the organization, has implicit trust granted. Additionally, the authentication method must be phishing-resistant and provide signals that attest to the protection of the […]Read morezero trustZero Trust ArchitectureZTA