Resource Category: White papers and reports
-
What is FIDO and why is it important for business security?
Learn what FIDO is, how it works, and how your organization can benefit from deploying FIDO-based authentication across critical business scenarios.
Read more -
Securing the world’s critical infrastructure against modern cyber threats
Learn how to safeguard IT/OT systems and the supply chain with Zero Trust using phishing-resistant MFA and hardware-backed security.
Read more -
How to get started with phishing-resistant MFA to secure pharmaceuticals
Learn the six deployment best practices that can help the pharmaceutical industry accelerate adoption of modern, phishing-resistant MFA at scale using the YubiKey.
Read more -
How to get started with phishing-resistant MFA to secure telecommunications
Learn deployment best practices to accelerate adoption at scale and secure your organization from account takeovers for telecommunications.
Read more -
State and local government best practices guide
Learn the six deployment best practices that can help your agency accelerate adoption of modern, phishing-resistant MFA at scale.
Read more -
2023 Gartner® Market Guide for User Authentication
Discover the latest in phishing-resistant multi-factor authentication (MFA) and how to minimize time to value for passwordless authentication, including the use of passkeys. Yubico is a Representative Vendor in the 2023 Gartner® Market Guide for User Authentication.
Read more -
Building a phishing-resistant enterprise with device-bound passkeys
Building an enterprise that stops account takeovers with phishing-resistant MFA using a device-bound passkey strategy.
Read more -
How to get started with phishing-resistant MFA to secure healthcare
Download the healthcare best practices guide to learn six deployment best practices to accelerate adoption at scale.
Read more -
Secure your AWS environment with highest-assurance phishing-resistant MFA
Download the best practice guide to learn more how you can stop account takeovers and go passwordless for a wide variety of AWS use cases
Read more -
Securing remote workers with phishing-resistant MFA
Learn why legacy authentication such as usernames and passwords, and mobile-based authenticators don’t protect remote workers against phishing attacks and account takeovers, and how the YubiKey ensures phishing-resistant multi-factor and passwordless authentication for critical remote work authentication business scenarios.
Read more