Blog

Stay up to date on company and partner news, product tips, and industry trends.

Home » Blog
Who we areWho we are What we doWhat we do Media assetsMedia assets Get in touchGet in touch BlogBlog Press ReleasesPress Releases
  • Okta + Yubico: Better togetherModern cybersecurity needs to be phishing-resistant, but it also needs to incorporate a great user experience for employees, IT teams and customers. We know traditional authentication methods are perceived as user-friendly, but they are not secure and vulnerable to most attacks  – in fact, 59% of people still rely on username and password to authenticate […]Read moreOktaPartner Program
  • Works with YubiKey Spotlight: How Yubico works with industry leaders who share the commitment to strong authenticationAs the cyber threat landscape continues to evolve rapidly in the form of more sophisticated attacks like phishing and ransomware, the need for industry collaborations and partnerships are more critical than ever to help businesses and consumers stay secure online. We first launched the Works with YubiKey (WWYK) program in 2018 with this in mind […]Read moreWorks with YubiKeywwyk
  • What CISA and NSA’s ESF guidance means for critical infrastructure cybersecurityThe Cybersecurity Infrastructure Security Agency (CISA) and the National Security Agency (NSA) recently collaborated to produce an important new document, “Identity and Access Management: Recommended Best Practices for Administrators.” Part of the Enduring Security Framework (ESF), it presents a distillation of identity access management (IAM) and cybersecurity guidance put forth by CISA to date, based […]Read moreCISAcritical infrastructureESFgovernmentNIST
  • YubiEnterprise Services reaches a new milestone with SOC 2 Type 2 attestation reportOver the years, we have witnessed malicious actors taking aim at organizational supply chains, seeking to exploit the weakest link in enterprises. Increasingly, passwords and even legacy multi-factor authentication (MFA) methods are being swiftly bypassed by phishing and ransomware – resulting in significant financial and reputational damage to organizations, as well as severe threats to […]Read moreSOC 2 Type 2YubiEnterprise DeliveryYubiEnterprise ServicesYubiEnterprise Subscription
  • key and devicesThe six biggest misconceptions about Zero Trust Architecture (ZTA)We talk a lot about Zero Trust architectures (ZTAs) at Yubico because we’d like to see every customer embrace its guiding principle: no user, whether they are authenticating from inside or outside the organization, has implicit trust granted. Additionally, the authentication method must be phishing-resistant and provide signals that attest to the protection of the […]Read morezero trustZero Trust ArchitectureZTA
  • Yubico joins industry cybersecurity leaders at White House symposium to collaborate, discuss top security challenges and solutionsLast week, several Yubico leaders traveled to Washington, DC to attend the White House’s symposium focused on modernizing authentication in support of Executive Order 14028 on Improving the Nation’s Cybersecurity, and the OMB Memo M-22-09 describing the Federal Zero Trust architecture. This event, organized by the Federal CIO & CISO and the Cybersecurity and Infrastructure […]Read moreExecutive Orderfederal governmentOMB Memo-22-09zero trust
  • Microsoft Entra ID adds FIDO2 support on iOSIn an effort to protect the nation’s infrastructure and improve cybersecurity, the Executive Order 14028 and the Office of Management and Budget Memo M-22-09 took a strong stance to require phishing-resistant authentication for all federal agencies. The M-22-09 memo also specifies two standards-based authentication protocols that will satisfy the phishing-resistant requirements, FIDO2/WebAuthn and PIV smart […]Read moreAzure ADConditional Access Authentication StrengthsiOSMicrosoftSafari
  • YubiEnterprise Services update: Single sign-on capabilities for greater enterprise scale and speedYubico’s YubiEnterprise Subscription pioneers hardware multi-factor authentication (MFA), the gold standard of enterprise authentication, as a phishing-resistant MFA ‘as-a-Service’ model that helps organizations save money and gain flexibility while experiencing faster rollouts. As part of consistently delivering value to organizations that are raising the bar for security at scale, we are prioritizing delivering meaningful updates […]Read moreSSOYubiEnterpriseYubiEnterprise Subscription
  • Amazon Web Services announces support for FIDO2 security keysAmazon recently announced improved support for using FIDO2 security keys as an MFA device to log on to the Amazon Web Services (AWS) console. As a result, FIDO2 security keys like the YubiKey are now supported on AWS GovCloud (US region) – providing phishing-resistant MFA for all users.  Additionally, AWS has improved their support for […]Read moreAmazon Web ServicesAWSFIDO2GovCloudgovernmentIAM
  • Are your shared workstations secured against cyber attacks?Shared workstation environments are common across many industries –from point-of-sale (POS) terminals in retail and grab-and-go devices for healthcare workers to call center kiosks and shared computers on manufacturing shop floors. While there can be cost savings and increase in productivity when multiple employees share, this can pose a significant security threat to businesses if […]Read moreHyattshared workstationsuser experience