Resource Category: White papers and reports
-
What is FIDO and why is it important for business security? Learn what FIDO is, how it works, and how your organization can benefit from deploying FIDO-based authentication across critical business scenarios. Read more FIDO MFA passwordless strong authentication -
Securing the world’s critical infrastructure against modern cyber threats Learn how to safeguard IT/OT systems and the supply chain with Zero Trust using phishing-resistant MFA and hardware-backed security. Read more critical infrastructure phishing-resistant MFA zero trust -
How to get started with phishing-resistant MFA to secure pharmaceuticals Learn the six deployment best practices that can help the pharmaceutical industry accelerate adoption of modern, phishing-resistant MFA at scale using the YubiKey. Read more best practices guide Pharma phishing-resistant MFA YubiKey -
How to get started with phishing-resistant MFA to secure telecommunications Learn deployment best practices to accelerate adoption at scale and secure your organization from account takeovers for telecommunications. Read more phishing-resistant MFA Telecommunication Yubico -
State and local government best practices guide Learn the six deployment best practices that can help your agency accelerate adoption of modern, phishing-resistant MFA at scale. Read more best practices guide phishing-resistant MFA state and local government YubiKey -
Building a phishing-resistant enterprise with device-bound passkeys Building an enterprise that stops account takeovers with phishing-resistant MFA using a device-bound passkey strategy. Read more account takeovers passkeys passwordless phishing-resistant MFA -
How to get started with phishing-resistant MFA to secure healthcare Download the healthcare best practices guide to learn six deployment best practices to accelerate adoption at scale. Read more best practices guide healthcare -
Secure your AWS environment with highest-assurance phishing-resistant MFA Download the best practice guide to learn more how you can stop account takeovers and go passwordless for a wide variety of AWS use cases Read more AWS passwordless phishing-resistant MFA -
Securing remote workers with phishing-resistant MFA Learn why legacy authentication such as usernames and passwords, and mobile-based authenticators don’t protect remote workers against phishing attacks and account takeovers, and how the YubiKey ensures phishing-resistant multi-factor and passwordless authentication for critical remote work authentication business scenarios. Read more phishing-resistant MFA remote and hybrid workers YubiKey -
Cyber hygiene: Enterprise resource guide for getting started with your YubiKey The YubiKey works with hundreds of applications and services, making strong security across multiple accounts simple and effective. Yubico is giving you a jumpstart on your multi-factor authentication journey by providing an enterprise resource guide to help you get your YubiKey up and running to protect applications and services within your organization. Download our ‘Enterprise […] Read more cybersecurity Enterprise security