Tag: YubiKey
-
FIDO authenticators and YubiKeys are making the internet safer In 2007, Yubico set out to protect as many people as possible by making secure login easy and available for everyone. We are happy Apple has joined Yubico, Google, and Microsoft on this journey by implementing W3C WebAuthn/FIDO compatible platform authenticators and are pleased to say that now all major platforms have adopted the standards […] Read more -
YubiKey 5 Series product brief The YubiKey 5 Series security keys deliver expanded authentication options. Read more -
YubiKey 5 FIPS product brief FIPS 140-2 Validation Ensures Strong Security and Compliance. Read more -
YubiKey for the Essential Eight brief Learn about the Essential Eight mitigation strategies and how phishing-resistant MFA like the YubiKey helps Australian organisations stay compliant with Maturity Levels 2 & 3. Read more -
YubiKey 5Ci product brief The first dual connector YubiKey, supporting USB-C and Lightning connectors. Read more -
How the YubiKey works Read more -
What is a Secure Static Password? How is a ModHex static password generated? Utilizing ModHex and its 16-character alphabet, and encoding that introduces a measure of “randomness”. A 32-character ModHex password would take a hacker around five billion years to even get a 1 in 2,158,056,614 chance of a correct guess (yes, that’s two billion!). Even a 16-character ModHex password would take around […] Read more -
What is OpenPGP? What is PGP? Pretty Good Privacy, commonly referred to as PGP, is an encryption program developed by Phil Zimmerman in 1991, originally to enable secure communication between anti-nuclear activists via bulletin board systems (BBSs). What is GPG? GPG, also known as GnuPG, is a complete and free implementation of the OpenPGP standard. The YubiKey follows […] Read more -
Modernize security across manufacturing In order to protect against modern cyber attacks on critical infrastructure and the software supply chain, security solutions need to modernize. Learn how to implement phishing-resistant MFA and safeguard the supply chain with Yubico solutions. Read more -
What is authentication assurance? What is authentication assurance level 3? The NIST is on version 3 of the Authentication Assurance levels, called Authentication Assurance Level 3 (AAL3). Authentication Assurance relies on examination of the cryptographic modules of an authenticator. Level 3 requirements (AAL3) means that the code is within a tamper-proof container so that keys used in the cryptography are destroyed […] Read more