Archive
Stay up to date on company and partner news, product tips, and industry trends.
-
YubiHSM 2 Now Qualified for AWS IoT Greengrass Hardware Security Integration
We are excited to announce that Amazon Web Service (AWS) Internet of Things (IoT) Greengrass users can now use Yubico’s hardware security module, the YubiHSM 2, Yubico’s ultra-portable hardware security module, for secure key storage. AWS IoT Greengrass software provides local compute, messaging, and data caching for the IoT devices, enabling users to run IoT […]
Read more -
Is there a good way to share passwords in an enterprise?
One of the most important facets of enterprise security is ensuring protection for all employee accounts. Password sharing methods play a critical role. When pressed for time, many users resort to sending unencrypted plain-text passwords via high risk channels like chat or email. There are other ways to securely share passwords across teams throughout an […]
Read more -
Yubico Launches YubiHSM 2: The World’s Smallest and Best Price/Performance Hardware Security Module, Providing Root of Trust for Servers and Computing Devices
The YubiHSM 2 differs from traditional HSM models — historically limited in use by cost, size, and performance — by offering advanced digital key protection capabilities and benefits at a price within reach for all organizations. Delivered in an ultra-slim “nano” form factor, the YubiHSM 2 fits inside a USB port, eliminating the need […]
Read more -
Versatility, Scale, Innovation Define YubiKeys
Depending on the numbers you consult, there are nearly three billion people on the internet, mostly protected by usernames and passwords, and nearly 100 million servers with limited or no protection. They are joined by an untold number of hackers feasting on this reality. This week, Yubico took on that scenario in a live webinar […]
Read more -
YubiKey, YubiHSM: Secret Weapons to Guard Secrets
U.S. intelligence officials in 2013 said they planned to significantly reduce the number of individuals within their network with system administrator privileges. Those privileges gave administrators rights to view and move around any document. “U.S. intelligence has invited so many people into the secret realm,” an official told NBC News, that it left the organization overly exposed to threats […]
Read more