Today, Yubico released its second annual State of Password and Authentication Security Behaviors Report, conducted by Ponemon Institute. The study surveyed 2,507 IT security practitioners in Australia, France, Germany, Sweden, United Kingdom, and United States, as well as 563 individual users. Last year’s report strictly focused on IT security professionals and their password and authentication […]
Read moreToday marks a milestone in Yubico history. For the first time ever, we are now offering a service-based solution for enterprises in need of a simple and efficient way to purchase and deliver YubiKeys at scale: YubiEnterprise Services. Until now, enterprises have struggled to effectively and easily implement YubiKeys across an entire organization, leaving many […]
Read moreAs more organizations undergo digital transformation initiatives, identity and access management (IAM) is becoming more critical than ever before. IAM sits at the heart of every business, which is why Yubico is excited to announce a new partnership this week at Gartner IAM Summit with one of the longest standing IAM vendors on the market: […]
Read moreAuthentication has made significant progress over the past five years. It has matured beyond passwords with the introduction of a variety of two-factor authentication methods, and most recently, we have the advent of passwordless logins with WebAuthn, the new global standard for web authentication. WebAuthn now sets a new bar for user authentication and is […]
Read moreIn the enterprise, smart cards simplify login to computers, VPNs, and online applications. Smart cards are also used for digitally signing emails and documents. While smart cards are known for delivering strong authentication, they are not simple to deploy. For example, to use a smart card in an enterprise setting, an admin must install client […]
Read moreOne of the most important facets of enterprise security is ensuring protection for all employee accounts. Password sharing methods play a critical role. When pressed for time, many users resort to sending unencrypted plain-text passwords via high risk channels like chat or email. There are other ways to securely share passwords across teams throughout an […]
Read moreProtecting your organization from a potential data breach starts with providing secure two-factor authentication (2FA) for all employees. Once employees are protected, you need to think about vendors and third parties that have access to your network, customer files, and other sensitive data. Do they have the appropriate protections put in place? According to a […]
Read moreRaise your hand if you’re a fan of security products that live up to their name and also deliver a delightful user experience! You know we are, and that’s why we’re happy to announce a joint effort with IBM to deliver FIDO Universal 2nd Factor (U2F) protection with the YubiKey through the IBM Security Access […]
Read moreWhen it comes to security, organizations have a lot of moving parts to consider. From mobile and desktop devices to servers, line-of-business applications, cloud storage, social media accounts, and more—these are all resources that can contain sensitive company information. Naturally, it’s important to minimize the security risk associated with these channels to help protect enterprise […]
Read moreAccording to the Verizon 2017 Data Breach Investigations Report, gaining access to a user’s personal or professional data through a malicious email is a cyber criminal’s weapon of choice. While many users might consider that there is nothing worth taking inside their inbox, they are most likely overlooking how connected their email is to other […]
Read more