Resource Category: White papers and reports
-
Why mobile authentication just isn’t good enough – Yubico Learn best practices to protect against enterprise-wide identity phishing and why mobile authentication just isn’t good enough. Read more -
Biometric authentication best practices Learn about biometric authentication approaches today, the gaps and the way to adopt biometric authentication best practices Read more -
Phishing-resistant authentication and compliance for healthcare organizations: How the YubiKey helps Healthcare Organizations meet regulatory requirements Read the white paper to learn how the YubiKey helps healthcare organizations ensure strong authentication and regulatory compliance Read more -
How the YubiKey meets global Financial Services regulations Read this white paper to learn how strong authentication using the YubiKey can help financial institutions stay protected against cyber attacks, and meet regulatory compliance for FFIEC, PCI DSS, GLBA, PSD2, eIDAS, SOX, SOC2, GDPR, and more. Read more -
How the YubiKey meets US Government regulations | Yubico Learn how the YubiKey, a DOD approved alternate authenticator meets federal PIV/CAC requirements and government compliance regulations. Read more -
Modern Authentication for the Federal Government – Yubico Learn how DOD approved hardware security keys such as the YubiKey are ideal to fill PIV and CAC related authentication gaps across the federal government, and meet the MFA mandate in the Biden Executive Order 14028. Read more -
How modern cyber threats are transforming global regulatory compliance Download the Yubico Compliance eBook to learn about the movement to Zero Trust and modern phishing-resistant authentication across different industries and how the YubiKey offers modern phishing-resistant authentication to help you drive high security and compliance. Read more -
Cybersecurity in the Work From Anywhere Era: Findings on Employee Attitudes and Adaptability to At-Home Corporate Security Read more to learn about findings on Employee Attitudes and Adaptability to At-Home Corporate Security Read more -
Bridge to Passwordles: Seven Steps to Execute a Smooth Passwordless Implementation Learn about the steps to take when implementing a passwordless strategy using FIDO2/WebAuthn, smart card, or a hybrid solution. Read more -
State of Alert: Multi-factor authentication and the future of data Read this report to learn why multi-factor authentication is critical for state and local government agencies, the consequences of not strengthening authentication, and how to bridge to a passwordless future Read more