The YubiKey is a portable root for remote workers, non PIV/CAC eligible workers, mobile/BYOD, and shared devices/workstations.
Read moreAmerica’s government is under attack. To put it more accurately, its governments are under attack, all the time, at every level — federal, state, and local — from opportunistic scammers, sophisticated cybercriminals, and even state actors. We’ve all seen the stories about intelligence services stealing political emails, snooping into election systems, and even penetrating the US power grid. But those are just […]
Read moreSecure sensitive information across government elections and political campaigns Easy, efficient, and strong authentication ensures protection against domestic and foreign threats by securing sensitive information and high-risk individuals. Read now: Modernizing election security with the YubiKey Ensure email confidentiality Foreign hackers are known to use email to infiltrate the political ecosystem. Passwords and SMS-based two-factor authentication […]
Read moreNavy JROTC to expands their uses of the YubiKey beyond U2F.
Read moreStringent DoD security requirements make the YubiKey the authentication hardware of choice.
Read moreState gov’t takes a proactive approach, selecting strong authentication for 1000+ election workers.
Read moreGOV.UK uses YubiKeys to allow citizens and residents to safely access UK government services online.
Read moreAs we enter the final month of the 2020 U.S. presidential race, election security and fraud is top of mind for many. With the memory of the 2016 Podesta breach still fresh, we are a nation braced for cyber-attack impact. Experts agree that, while countless security improvements have been made since 2016, we should expect more vigorous phishing attacks, data theft, […]
Read moreThis blog is co-authored by John Fontana, Standards Analyst at Yubico. On both sides of the Atlantic, standards and regulations on electronic identification are being revised more or less simultaneously. In the United States, the National Institute of Standards and Technology (NIST) accepted public comments on its SP 800-63-3 Digital Identity Guidelines last month, which is on […]
Read moreSecuring mobile, tablet and notebook users with high-assurance multi-factor authentication.
Read more