Resource Category: White papers and reports

Thumbnail

Graduating from legacy MFA to modern authentication

Download the Yubico White Paper, Graduating from legacy MFA to modern authentication: The critical need for increased security across education, to learn authentication best practices in modernizing authentication to stop modern day cyber threats.

Thumbnail

Protecting the supply chain with highest-assurance security

Download the Yubico White Paper, Protecting the supply chain with highest-assurance security: Go passwordless, ensure product integrity, and protect the software supply chain, to learn authentication best practices in securing supply chain integrity.

Thumbnail

Protecting manufacturing with highest-assurance security

Learn how to secure manufacturing organizations and the importance of strong security and phishing-resistant MFA.

Thumbnail

Gartner® Research Report: U.S. Federal CIO Priorities to Comply With the Executive Order to Improve Cybersecurity

Read the Gartner Research Report to see a breakdown of guidance to CIOs and other leaders within organizations to get prepared for a modern cyberthreat era.

Thumbnail

Maximizing security across pharma’s digital transformation with phishing-resistant MFA

Read this white paper to learn how to achieve phishing-resistant MFA and passwordless across the pharmaceutical industry

Thumbnail

Best practices for securing mobile-restricted environments

Learn security best practices to secure mobile-restricted environments where users can’t, won’t, or don’t use a mobile phone, and therefore weak forms of protection such as mobile authentication is simply not even an option.

Thumbnail

The critical strong authentication need for privileged users: Why legacy authentication is putting your privileged users at risk

Step one in any effective cyber security program includes securing privileged accounts, credentials, and secrets with modern strong authentication. Download the Yubico White Paper, The critical strong authentication need for privileged users, to learn who really is a privileged user, and industry best practices to secure your privileged users against phishing attacks and account takeovers.

Thumbnail

Securing shared workstations against modern cyber threats

Download the Yubico White Paper, to learn the key considerations for authentication across shared workstation environments such as call centers, manufacturing floors, retail and hospitality kiosks, medical stations, and others.

Thumbnail

Modern Authentication for State and Local Government: How hardware security keys are modernizing MFA

Learn how local government agencies are using YubiKeys to easily achieve 100 percent MFA coverage.

Thumbnail

How State and Local Governments are Combating Account Takeovers: A Government Technology Case Study

Read how state and local governments are securing workers, election infrastructure, and digital services using the YubiKey for strong authentication