Tag: authentication

Thumbnail

Feb 5, 2018

Why 2018 will be the year for authentication hardware

A journalist recently asked me why the world is seeing the return of hardware authentication. My response is that hardware actually never went away. Today, there is no more prevalent form of user verification than hardware. If there had been an easier and more secure way to deploy and revoke user credentials for billions of

Thumbnail

Jul 5, 2017

Flexible Modern Authentication with the Multi-Protocol YubiKey

Most organizations work with multiple services and applications, and thus different authentication protocols, to meet all their security needs. Oftentimes, the protocol is predetermined by the application or service provider. However, in other cases, a business or systems integrator has some flexibility on which integration approach or third party to use. When it comes to

Thumbnail

Lock down your login with YubiKey

“78 percent [of Americans] strongly or somewhat agree it is important that companies, government entities and other stakeholders work together to find new ways of securing accounts beyond the use of passwords.” – National Cyber Security Alliance (NCSA) Strong Authentication Survey, July 2016 Research is clear — the world needs new and better ways of

Thumbnail

Jul 28, 2016

Over A Dozen Services Supporting FIDO U2F

Updated Oct. 10, 2016 to include U2F support added to Opera browser, Salesforce Creating standards is hard work that only sweetens when the market starts to arrive and validate the effort with real world deployments. On June 22, Bitbucket, GitLab, and Sentry all released support for FIDO U2F strong authentication in their cloud-based products. None of

Thumbnail

Apr 19, 2016

Yubico, Centrify Align On Authentication Versatility

Versatility is a theme that has emerged with the YubiKey, whether it’s support for Personal Identity Verification (PIV)-based capabilities, one-time passwords (OTP), or mobile authentication. These authentication options are attractive to users and businesses because they’re contained in a single YubiKey that solves multiple use cases, simplifies user training, and improves security.  Our partner Centrify

UK Becomes the First Government to Offer Secure Online Identities Based on FIDO U2F Standards

Compromised online identities have reached a level that has exposed the weaknesses in usernames and passwords as well as traditional software security solutions. Government services around the world have a growing demand for strong two-factor authentication, but traditional hardware technologies have been too costly and complicated to scale for most countries and internet users. The

Thumbnail

Jan 22, 2016

10X Growth With World’s Largest Brands

“The best way to predict the future is to invent it.” — Alan Kay, American computer scientist In 2012, shortly after Yubico’s CTO and I had moved from Stockholm to Silicon Valley, we were invited to a meeting at Google’s headquarters. We were nine people, from seven different countries, who had gathered around a conference

Thumbnail

Hello, SSO. It’s me, authentication

There’s a secret that single sign-on (SSO) never talks about. It’s called authentication. The SSO conversation starts without mentioning the assumption that the user is already logged in. A login that requires a password. Instead, SSO is quickly positioned to triumph over the dangers of weak and reused passwords. Many times, however, those same suspect passwords

Thumbnail

Mar 11, 2015

Yubikey and the Emerging World of Wireless Mobile Authentication

Wireless has become the de-facto connecting point for consumers today and even among enterprises, where employees expect to leave behind desktop Ethernet connections for wireless connectivity in board rooms, conference rooms and common areas. Apple makes this point emphatically with its new MacBook where the message is everything should be done without wires via technology

Thumbnail

My Work Day Reflects YubiKey’s Flexibility

I work as a developer at Yubico. Like a lot of developers these days I’m empowered to not only develop software, but to publish it and configure the servers it runs on. This means that I have access to many systems, to which I authenticate using different keys, requiring the flexibility of a YubiKey. The