Tag: YubiKey FIPS Series
Jun 21, 2021
Seven tips if you’re still scratching your head after reading Biden’s cybersecurity executive order
Yubico works with a lot of federal agencies and contractors, as well as with customers in regulated industries, so we understand the challenges new compliance regulations can bring. The executive order that was released May 12 can be seen as the federal government fully embracing the move toward multi-factor authentication (MFA) for use cases where …
May 3, 2021
The YubiKey 5 FIPS Series is here and there are 5 things you need to know
Today, we’re thrilled to announce yet another product milestone in addition to the launch of YubiHSM 2 FIPS — the long-awaited YubiKey 5 FIPS Series is now generally available. It is the industry’s first set of multi-protocol security keys with support for FIDO2 and WebAuthn, along with smart card (PIV/CAC), to receive FIPS 140-2 validation, Overall …
YubiKey FIPS Series
The series at a glance
What is FIPS 140-2?
Other than government do any other industries use FIPS 140-2? Learn More FIPS 140-2 validated YubiKey Series blog YubiKey FIPS Series Developer Resources YubiKey Hardware What is PIV?
YubiKey for Federal Government
Highest assurance multi-factor authentication for Federal Government In accordance with Homeland Security Presidential Directive 12 (HSPD 12), YubiKeys provide high assurance authentication without compromise to help you go passwordless, and modernize multi-factor authentication and smart card deployments. Meets Federal Government Compliance Requirements Manufactured securely in the United States using stringent processes and secure supply chain …
Jun 25, 2018
Now available! FIPS 140-2 validated YubiKey series
Today, we’re excited to announce the certification and availability of our YubiKey FIPS series, the first multi-protocol FIPS 140-2 validated security keys. FIPS 140-2 is a US government computer security standard, published by the National Institute of Standards and Technology (NIST), that covers the use of cryptographic functionality such as encryption, authentication, and digital signatures. …