Archive
Stay up to date on company and partner news, product tips, and industry trends.
-
Ponemon 2019 State of Password and Authentication Security Behaviors Report
There are a growing number of security breaches happening daily to individuals and businesses.
Read more -
Yubico Lands a16z Investment and Grows Board of Directors
Today, Yubico is proud to announce its latest round of investment from Andreessen Horowitz (a16z). a16z is supporting Yubico’s mission to create a safer internet for everyone by providing ubiquitous secure access to computers, networks and servers. The company has been growing with profits over the last six years, and will use funds from the […]
Read more -
New NIST Authentication Guidelines for Public Safety and First Responders
Over the past few months, Yubico has been working closely with the U.S. National Institute of Standards (NIST) National Cybersecurity Center of Excellence (NCCoE) to improve mobile authentication methods for public safety professionals and first responders. Today, we’re happy to share that this guidance is now available in the form of a three-volume draft practice […]
Read more -
Buckle Up for a Safer Internet
Some cynics say that the problem of internet security will only continue to get worse, and that there is nothing we can do, but manage and minimize damages and losses. As an optimist, I completely disagree. Throughout our existence, people have faced and resolved extremely complex and evolving challenges—a great example of which is automobile […]
Read more -
Why 2018 will be the year for authentication hardware
A journalist recently asked me why the world is seeing the return of hardware authentication. My response is that hardware actually never went away. Today, there is no more prevalent form of user verification than hardware. If there had been an easier and more secure way to deploy and revoke user credentials for billions of […]
Read more -
Flexible Modern Authentication with the Multi-Protocol YubiKey
Most organizations work with multiple services and applications, and thus different authentication protocols, to meet all their security needs. Oftentimes, the protocol is predetermined by the application or service provider. However, in other cases, a business or systems integrator has some flexibility on which integration approach or third party to use. When it comes to […]
Read more -
Lock down your login with YubiKey
“78 percent [of Americans] strongly or somewhat agree it is important that companies, government entities and other stakeholders work together to find new ways of securing accounts beyond the use of passwords.” – National Cyber Security Alliance (NCSA) Strong Authentication Survey, July 2016 Research is clear — the world needs new and better ways of […]
Read more -
Over A Dozen Services Supporting FIDO U2F
Updated Oct. 10, 2016 to include U2F support added to Opera browser, Salesforce Creating standards is hard work that only sweetens when the market starts to arrive and validate the effort with real world deployments. On June 22, Bitbucket, GitLab, and Sentry all released support for FIDO U2F strong authentication in their cloud-based products. None of […]
Read more -
Yubico, Centrify Align On Authentication Versatility
Versatility is a theme that has emerged with the YubiKey, whether it’s support for Personal Identity Verification (PIV)-based capabilities, one-time passwords (OTP), or mobile authentication. These authentication options are attractive to users and businesses because they’re contained in a single YubiKey that solves multiple use cases, simplifies user training, and improves security. Our partner Centrify […]
Read more -
UK Becomes the First Government to Offer Secure Online Identities Based on FIDO U2F Standards
Compromised online identities have reached a level that has exposed the weaknesses in usernames and passwords as well as traditional software security solutions. Government services around the world have a growing demand for strong two-factor authentication, but traditional hardware technologies have been too costly and complicated to scale for most countries and internet users. The […]
Read more