Tag: authentication


Feb 5, 2018
Why 2018 will be the year for authentication hardware
A journalist recently asked me why the world is seeing the return of hardware authentication. My response is that hardware actually never went away. Today, there is no more prevalent form of user verification than hardware. If there had been an easier and more secure way to deploy and revoke user credentials for billions of …

Jul 5, 2017
Flexible Modern Authentication with the Multi-Protocol YubiKey
Most organizations work with multiple services and applications, and thus different authentication protocols, to meet all their security needs. Oftentimes, the protocol is predetermined by the application or service provider. However, in other cases, a business or systems integrator has some flexibility on which integration approach or third party to use. When it comes to …

Sep 29, 2016
Lock down your login with YubiKey
“78 percent [of Americans] strongly or somewhat agree it is important that companies, government entities and other stakeholders work together to find new ways of securing accounts beyond the use of passwords.” – National Cyber Security Alliance (NCSA) Strong Authentication Survey, July 2016 Research is clear — the world needs new and better ways of …

Jul 28, 2016
Over A Dozen Services Supporting FIDO U2F
Updated Oct. 10, 2016 to include U2F support added to Opera browser, Salesforce Creating standards is hard work that only sweetens when the market starts to arrive and validate the effort with real world deployments. On June 22, Bitbucket, GitLab, and Sentry all released support for FIDO U2F strong authentication in their cloud-based products. None of …

Apr 19, 2016
Yubico, Centrify Align On Authentication Versatility
Versatility is a theme that has emerged with the YubiKey, whether it’s support for Personal Identity Verification (PIV)-based capabilities, one-time passwords (OTP), or mobile authentication. These authentication options are attractive to users and businesses because they’re contained in a single YubiKey that solves multiple use cases, simplifies user training, and improves security. Our partner Centrify …
UK Becomes the First Government to Offer Secure Online Identities Based on FIDO U2F Standards
Compromised online identities have reached a level that has exposed the weaknesses in usernames and passwords as well as traditional software security solutions. Government services around the world have a growing demand for strong two-factor authentication, but traditional hardware technologies have been too costly and complicated to scale for most countries and internet users. The …

Jan 22, 2016
10X Growth With World’s Largest Brands
“The best way to predict the future is to invent it.” — Alan Kay, American computer scientist In 2012, shortly after Yubico’s CTO and I had moved from Stockholm to Silicon Valley, we were invited to a meeting at Google’s headquarters. We were nine people, from seven different countries, who had gathered around a conference …

Jun 8, 2015
Hello, SSO. It’s me, authentication
There’s a secret that single sign-on (SSO) never talks about. It’s called authentication. The SSO conversation starts without mentioning the assumption that the user is already logged in. A login that requires a password. Instead, SSO is quickly positioned to triumph over the dangers of weak and reused passwords. Many times, however, those same suspect passwords …

Mar 11, 2015
Yubikey and the Emerging World of Wireless Mobile Authentication
Wireless has become the de-facto connecting point for consumers today and even among enterprises, where employees expect to leave behind desktop Ethernet connections for wireless connectivity in board rooms, conference rooms and common areas. Apple makes this point emphatically with its new MacBook where the message is everything should be done without wires via technology …

Mar 4, 2015
My Work Day Reflects YubiKey’s Flexibility
I work as a developer at Yubico. Like a lot of developers these days I’m empowered to not only develop software, but to publish it and configure the servers it runs on. This means that I have access to many systems, to which I authenticate using different keys, requiring the flexibility of a YubiKey. The …