Archive
Stay up to date on company and partner news, product tips, and industry trends.
-
YubiKey 5 Series product brief
The YubiKey 5 Series security keys deliver expanded authentication options.
Read more -
YubiKey 5 FIPS product brief
FIPS 140-2 Validation Ensures Strong Security and Compliance.
Read more -
YubiKey for the Essential Eight brief
How a YubiKey solution complies with the mitigation strategy to limit the extent of cyber security incidents.
Read more -
YubiKey 5Ci product brief
The first dual connector YubiKey, supporting USB-C and Lightning connectors.
Read more -
How the YubiKey works
Proven security at scale Stop account Takeovers YubiKeys are trusted by the world’s largest companies and users have experienced 0 account takeovers. Learn More Easy to Setup and Support It’s as easy as USB! Access your accounts 4x faster than other 2FA, and cut support calls by 92% Learn More Purpose-built for Security Unlike other […]
Read more -
What is a Secure Static Password?
How is a ModHex static password generated? Utilizing ModHex and its 16-character alphabet, and encoding that introduces a measure of “randomness”. A 32-character ModHex password would take a hacker around five billion years to even get a 1 in 2,158,056,614 chance of a correct guess (yes, that’s two billion!). Even a 16-character ModHex password would take around […]
Read more -
What is OpenPGP?
What is PGP? Pretty Good Privacy, commonly referred to as PGP, is an encryption program developed by Phil Zimmerman in 1991, originally to enable secure communication between anti-nuclear activists via bulletin board systems (BBSs). What is GPG? GPG, also known as GnuPG, is a complete and free implementation of the OpenPGP standard. The YubiKey follows […]
Read more -
Modernize security across manufacturing
In order to protect against modern cyber attacks on critical infrastructure and the software supply chain, security solutions need to modernize. Learn how to implement phishing-resistant MFA and safeguard the supply chain with Yubico solutions.
Read more -
What is authentication assurance?
What is authentication assurance level 3? The NIST is on version 3 of the Authentication Assurance levels, called Authentication Assurance Level 3 (AAL3). Authentication Assurance relies on examination of the cryptographic modules of an authenticator. Level 3 requirements (AAL3) means that the code is within a tamper-proof container so that keys used in the cryptography are destroyed […]
Read more -
OATH – TOTP
What is OATH? Open Authentication (OATH) is an initiative addressing challenges making standard, open technology available to all. Learn more about OATH How to use OATH with the YubiKey? When using OATH with a YubiKey, the shared secrets are stored and processed in the YubiKey’s secure element. This has two advantages over storing secrets on […]
Read more