Resource Category: White papers and reports

  • tablet screenCreating phishing-resistant users across financial services in a passkey ageDownload the Yubico e-book, Creating phishing-resistant users across financial services in a passkey age, to learn about the difference between synced passkeys and device-bound passkeys.Read more
  • Protecting insurance organizations against modern cyber threats white paper coverProtecting insurance organizations against modern cyber threatsLearn how insurance organizations can alleviate cyber risk by cultivating phishing-resistant users using the YubiKey for phishing-resistant multi-factor and passwordless authentication.Read moreinsurancephishing-resistant MFAYubiKey
  • nis2NIS2 ComplianceThe NIS2 Directive, effective January 2023, expands the scope of the original NIS Directive to include stricter cybersecurity requirements across more sectors in the EU. It mandates enhanced security measures like incident reporting, multi-factor authentication, and supply chain security, with penalties for non-compliance reaching up to €10M or 2% of annual revenue. Organizations must ensure compliance by October 2024 to avoid significant fines and operational risks.Read morecompliancenis2YubiKey
  • best practices guide for education cover imageHow to get started with the YubiKey for educationLearn the six deployment best practices to protect your education organization from cyberattacks and accelerate adoption at scale. Read morebest practices guidedeploymenteducationYubiKey
  • EMA report previewThe evolving threat of phishing and social engineeringThe report classifies the three major passkey credentials in the market and highlights the benefits of creating phishing-resistant users.Read more
  • Going passwordless in a passkey age white paper coverGoing passwordless in a passkey ageRead the Yubico white paper to get real guidance on how enterprises can evaluate passwordless authentication options in the age of passkeys. This white paper discusses how enterprises can address and mitigate current and future issues with a sound passwordless deployment.Read morepasskeyspasswordlessYubiKey
  • Essential Eight best practices guide previewHow to get started with phishing-resistant MFA for Essential 8 complianceLearn six deployment best practices that can help you accelerate the adoption of modern, phishing-resistant MFA at scale using the YubiKey.Read morebest practices guidecompliancephishing-resistant MFA
  • How to get started with phishing-resistant MFA to secure federal systems integratorsExplore best practices for implementing phishing-resistant multi-factor authentication (MFA) tailored for Federal Systems Integrators (FSIs) to enhance security against sophisticated cyber threats.Read morefederal systems integratorsMFAphishing-resistant authentication
  • What is FIDO and why is it important for business security? cover imageWhat is FIDO and why is it important for business security?Learn what FIDO is, how it works, and how your organization can benefit from deploying FIDO-based authentication across critical business scenarios.Read moreFIDOMFApasswordlessstrong authentication