Resource Category: White papers and reports
-
NIS2 Compliance The NIS2 Directive, effective January 2023, expands the scope of the original NIS Directive to include stricter cybersecurity requirements across more sectors in the EU. It mandates enhanced security measures like incident reporting, multi-factor authentication, and supply chain security, with penalties for non-compliance reaching up to €10M or 2% of annual revenue. Organizations must ensure compliance by October 2024 to avoid significant fines and operational risks. Read more compliance nis2 YubiKey -
How to get started with the YubiKey for education Learn the six deployment best practices to protect your education organization from cyberattacks and accelerate adoption at scale. Read more best practices guide deployment education YubiKey -
The evolving threat of phishing and social engineering The report classifies the three major passkey credentials in the market and highlights the benefits of creating phishing-resistant users. Read more -
Going passwordless in a passkey age Read the Yubico white paper to get real guidance on how enterprises can evaluate passwordless authentication options in the age of passkeys. This white paper discusses how enterprises can address and mitigate current and future issues with a sound passwordless deployment. Read more passkeys passwordless YubiKey -
How to get started with phishing-resistant MFA for Essential 8 compliance Learn six deployment best practices that can help you accelerate the adoption of modern, phishing-resistant MFA at scale using the YubiKey. Read more best practices guide compliance phishing-resistant MFA -
How to get started with phishing-resistant MFA to secure federal systems integrators Explore best practices for implementing phishing-resistant multi-factor authentication (MFA) tailored for Federal Systems Integrators (FSIs) to enhance security against sophisticated cyber threats. Read more federal systems integrators MFA phishing-resistant authentication -
What is FIDO and why is it important for business security? Learn what FIDO is, how it works, and how your organization can benefit from deploying FIDO-based authentication across critical business scenarios. Read more FIDO MFA passwordless strong authentication -
Securing the world’s critical infrastructure against modern cyber threats Learn how to safeguard IT/OT systems and the supply chain with Zero Trust using phishing-resistant MFA and hardware-backed security. Read more critical infrastructure phishing-resistant MFA zero trust -
How to get started with phishing-resistant MFA to secure pharmaceuticals Learn the six deployment best practices that can help the pharmaceutical industry accelerate adoption of modern, phishing-resistant MFA at scale using the YubiKey. Read more best practices guide Pharma phishing-resistant MFA YubiKey -
How to get started with phishing-resistant MFA to secure telecommunications Learn deployment best practices to accelerate adoption at scale and secure your organization from account takeovers for telecommunications. Read more phishing-resistant MFA Telecommunication Yubico