Zero account takeovers with the YubiKey The username and password combination and SMS-based MFA are the most common authentication methods used by remote workers according to research by S & P Global Market Intelligence. While MFA can be a strong first-line of defense to protect remote and hybrid workers against phishing and ransomware, not all […]
Read moreFacebook makes security effortless for employees, balancing usability and security
Read moreGoogle improves security, accelerates productivity, and reduces support costs with the YubiKey.
Read moreAs Yubico’s Chief Information Security Officer (CISO), I am responsible for the company’s security, risk management, and compliance programs. I have more than 20 years of experience solving complex security scenarios, but I have yet to encounter the unique landscape that we are collectively facing as IT leaders. Many of my peers and businesses across […]
Read moreJoin this webinar to learn five critical ways companies can protect their remote workforce from common vulnerabilities.
Read moreToday’s standardization of WebAuthn by the World Wide Web Consortium (W3C) marks a milestone in the history of open authentication standards and internet security, and Yubico is excited to be a part of it. Through close collaboration with the global internet standards community and the internet giants, Google and Microsoft, we achieved the near-impossible: the creation […]
Read morePhishing attacks are now considered the main source of data breaches. 91% of cyber attacks start with a phishing email * Ten years ago, if you asked someone what ‘phishing’ was, they probably would have no idea. Since then, times have changed considerably; phishing attacks are now responsible for a significant number of major data […]
Read moreCreating accounts online just got a whole lot easier. Now anyone can log in to or register a new account using their existing credentials from social networking services, such as Facebook and Google. With social logins, users won’t have to rack their brain for another password, saving time and securely authenticating their identity. Websites that […]
Read more