Resource Category: White papers and reports

  • EMA report previewThe evolving threat of phishing and social engineeringThe report classifies the three major passkey credentials in the market and highlights the benefits of creating phishing-resistant users.Read more
  • Going passwordless in a passkey age white paper coverGoing passwordless in a passkey ageRead the Yubico white paper to get real guidance on how enterprises can evaluate passwordless authentication options in the age of passkeys. This white paper discusses how enterprises can address and mitigate current and future issues with a sound passwordless deployment.Read morepasskeyspasswordlessYubiKey
  • Essential Eight best practices guide previewHow to get started with phishing-resistant MFA for Essential 8 complianceLearn six deployment best practices that can help you accelerate the adoption of modern, phishing-resistant MFA at scale using the YubiKey.Read morebest practices guidecompliancephishing-resistant MFA
  • How to get started with phishing-resistant MFA to secure federal systems integratorsExplore best practices for implementing phishing-resistant multi-factor authentication (MFA) tailored for Federal Systems Integrators (FSIs) to enhance security against sophisticated cyber threats.Read morefederal systems integratorsMFAphishing-resistant authentication
  • What is FIDO and why is it important for business security? cover imageWhat is FIDO and why is it important for business security?Learn what FIDO is, how it works, and how your organization can benefit from deploying FIDO-based authentication across critical business scenarios.Read moreFIDOMFApasswordlessstrong authentication
  • Securing critical infrastructure white paper cover imageSecuring the world’s critical infrastructure against modern cyber threatsLearn how to safeguard IT/OT systems and the supply chain with Zero Trust using phishing-resistant MFA and hardware-backed security. Read morecritical infrastructurephishing-resistant MFAzero trust
  • pharmaceuticals best practices guide featured imageHow to get started with phishing-resistant MFA to secure pharmaceuticalsLearn the six deployment best practices that can help the pharmaceutical industry accelerate adoption of modern, phishing-resistant MFA at scale using the YubiKey.Read morebest practices guidePharmaphishing-resistant MFAYubiKey
  • How to get started with phishing-resistant MFA to secure telecommunicationsLearn deployment best practices to accelerate adoption at scale and secure your organization from account takeovers for telecommunications.Read morephishing-resistant MFATelecommunicationYubico
  • state and local best practices featured imageState and local government best practices guideLearn the six deployment best practices that can help your agency accelerate adoption of modern, phishing-resistant MFA at scale.Read morebest practices guidephishing-resistant MFAstate and local governmentYubiKey