With 2024 being a leap year, this gives business an extra opportunity to “leap” toward reflecting, adjusting and aligning all aspects of their organization – including an increasingly critical area in cybersecurity. With bad actors and cyber attacks like phishing becoming increasingly sophisticated, enterprises need to stay ahead of evolving cyber threats and regulatory requirements […]
Read moreDuring the holiday season, people flock online to complete their holiday shopping, book travel, and increase their social media posts. Unfortunately, cyber attackers know this as well, and phishing attacks, such as AI-based or QR code-based, introduces an added risk if you aren’t practicing good security hygiene during these active times. As the year comes […]
Read moreOctober is National Cybersecurity Awareness Month (NCSAM), a dedicated month for the public and private sectors to work together to raise awareness about the importance of cybersecurity and providing individuals and organizations with the resources they need to stay safe from cyber threats. ‘Secure Our World’ is the theme for this year’s NCSAM, and is […]
Read moreAs the cyber threat landscape continues to evolve rapidly in the form of more sophisticated attacks like phishing and ransomware, the need for industry collaborations and partnerships are more critical than ever to help businesses and consumers stay secure online. We first launched the Works with YubiKey (WWYK) program in 2018 with this in mind […]
Read moreWe know traditional authentication methods haven’t always been the most user-friendly, which is why we created the YubiKey––it makes logging into your accounts simple and secure.
Read moreEnterprise security made easy.
Read moreHighest assurance authentication that’s fast and easy Strongest 2FA A physical security key, that can be added to a keychain and plugged into a computer, tablet or mobile device, adds an extra layer of protection on top of passwords to offer the strongest second factor authentication protection against phishing attacks. Strongest MFA Users can combine […]
Read moreVerify your YubiKey integration and manage your listing on the online catalog. Please use this checklist to verify your product integration’s usability. Applicants that receive a passing mark on the checklist will progress to the catalog listing form requesting details on your product integration. Any questions? Please email wwyk@yubico.com. Read more about how Yubico uses […]
Read moreUse this form to provide high-level product information about your YubiKey integration. We’ll review your submission and let you know once it’s listed on our catalog. Any questions? Please email wwyk-mktg@yubico.com. Read more about how Yubico uses the personal data you submit If the above form isn’t visible to you, you can access it directly on […]
Read moreGreat news YubiFans! As of today, Twitter made it a lot easier for you to tweet safely and keep your accounts secure. Phishing-resistant YubiKey authentication via WebAuthn is now supported on Twitter’s desktop, Android and iOS mobile applications. With native WebAuthn support throughout the Twitter platform, you can register and use a USB-, NFC-, or Lightning-compatible security key, like […]
Read more