Archive
Stay up to date on company and partner news, product tips, and industry trends.
-
State of Alert: Multi-factor authentication and the future of data
Read this report to learn why multi-factor authentication is critical for state and local government agencies, the consequences of not strengthening authentication, and how to bridge to a passwordless future
Read more -
Remote Work During COVID-19 Drives MFA Adoption
Come learn what the 451 Research Advisory team discovered after they surveyed 200 respondents across North America to understand preferences and adoption trends.
Read more -
2021 Yubico and 451 Research Study: Work-from-Home Policies Driving MFA Adoption, But Still Work to be Done
Learn preferences and adoption trends with respect to multi-factor authentication in the enterprise.
Read more -
Accounting for the human element: A security tool that nobody wants to use is destined for the trash heap
To continue our effort to peel back the layers on the journey to passwordless, Yubico talked with former Navy intelligence officer and University of Tulsa professor, Sal Aurigemma, about his research in the behavioral information security field. Professor Aurigemma focuses on end-user experiences and adoption rates of authentication technologies. He regularly runs field experiments with […]
Read more -
Ping Identity partner brief
PingID and YubiKey together comprise a modern MFA solution.
Read more -
Okta partner brief
The YubiKey and Okta Adaptive MFA provide the strongest level of identity assurance and defense against phishing and man-in-the-middle attacks, while also delivering a simple and seamless user experience
Read more -
Duo Security partner brief
YubiKeys coupled with Duo MFA provide an easily understood, secure solution.
Read more -
What is IAM (Identity and access management)?
Identity and Access Management Identity and Access Management (often abbreviated IAM) is a combination of technologies, techniques, and policies employed by companies to manage conditional user access across elements of their tech stack. The form IAM takes can vary widely across different enterprises, but the two primary objectives of Identity and Access Management are undeniably […]
Read more -
FIDO2 passwordless authentication
Improved usability Use of a hardware-based security key is fast and easy. For FIDO2 supported services, users are freed from having to remember and type passwords. Strong account security Replaces weak passwords with strong hardware-based authentication using Private / Public Key (asymmetric) cryptography. One key to all accounts A single security key that can work […]
Read more -
Multi-factor authentication (MFA) explained
What is multi-factor authentication? Multi-factor authentication (MFA) can greatly enhance security while delivering a positive user experience. MFA is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence, or factors, to an authentication mechanism. * The 2019 State of Password and Authentication Security […]
Read more