Archive
Stay up to date on company and partner news, product tips, and industry trends.
-
Mid-Year State of Cyber Security Report: EMEA and NAM
Read the Cyber Security Hub Mid-Year State of Cybersecurity Report to learn the trends, challenges and investment decisions in EMEA and NAM.
Read more -
Securing Critical Infrastructure
Discover how phishing-resistant MFA shields global critical infrastructure. Yubico’s infographic reveals key stats and modern defense strategies.
Read more -
Cybersecurity Insiders report: Path to Zero Trust
Rapid digital transformation, increased remote work, and evolving cybersecurity threats have catapulted Zero Trust from an IT buzzword to a foundational cybersecurity model. In our comprehensive report, “The Path to Zero Trust: Industry Insights and Best Practices”, we delve into the latest adoption trends, challenges, and the current state of Zero Trust, based on a […]
Read more -
Afni case study
Since 1936, Afni has grown into a premier customer engagement specialist. Keeping customer data safeguarded is critical and their CISO added Yubico’s phishing-resistant MFA to keep their data safe.
Read more -
Cybersecurity and our planet: The role of modern authentication
Join Yubico and and our esteemed panel as we discuss the role of cybersecurity and how securing user access to critical infrastructure services with modern phishing-resistant authentication is integral in safeguarding the most sensitive information, processes, and systems that our society depends on.
Read more -
Hackers don’t break in. They log in.
Cyber crime is surging like never before… 300% Rise in cyber crime since the pandemic began1. 59% Of companies have had a security breach in the last year2. 9 out of 10 Cyber attacks begin with a phishing email3. Most cyber attacks begin as phishing Phishing is a cybercrime where attackers induce people to reveal […]
Read more -
Hackers don’t break in. They log in.
Cyber crime is surging like never before… 300% Rise in cyber crime since the pandemic began1. 53% Of companies in Europe & the Middle East have been victims of cyber attacks2. 9 out of 10 Cyber attacks begin with a phishing email3. Most cyber attacks begin as phishing Phishing is the fraudulent practice of inducing […]
Read more -
Meeting enhanced cyber insurance requirements with strong authentication
Cyber risk is becoming an ever-greater business liability, with 40% of business leaders reporting cyber threats as the No. 1 business risk. As a result, organizations have increasingly turned to cyber insurance to help them recover from damage or minimize impact. Read this whitepaper to learn about the changing cyber threat and cyber insurance landscape, and the best way to position your organization to qualify more easily for cyber insurance.
Read more -
Protecting retail and hospitality against modern cyber threats
Learn how modernizing authentication can secure shared devices, protect sensitive data, and prevent account takeovers while enhancing customer experience.
Read more -
Executive Order 14028
Executive Order 14028 is a cybersecurity order issued by President Biden requiring agencies to improve and standardize defenses of their digital systems. The EO spawned a number of policy changes to improve software supply chain security, mandate Zero Trust cybersecurity principles, and phishing-resistant MFA. The recent frequency of widespread and invasive cyber attacks has prompted the government to take action.
Read more