Resource Category: White papers and reports
-
NIS2 Compliance The NIS2 Directive, effective January 2023, expands the scope of the original NIS Directive to include stricter cybersecurity requirements across more sectors in the EU. It mandates enhanced security measures like incident reporting, multi-factor authentication, and supply chain security, with penalties for non-compliance reaching up to €10M or 2% of annual revenue. Organizations must ensure compliance by October 2024 to avoid significant fines and operational risks. Read more -
How to get started with the YubiKey for education Learn the six deployment best practices to protect your education organization from cyberattacks and accelerate adoption at scale. Read more -
The evolving threat of phishing and social engineering The report classifies the three major passkey credentials in the market and highlights the benefits of creating phishing-resistant users. Read more -
Going passwordless in a passkey age Read the Yubico white paper to get real guidance on how enterprises can evaluate passwordless authentication options in the age of passkeys. This white paper discusses how enterprises can address and mitigate current and future issues with a sound passwordless deployment. Read more -
How to get started with phishing-resistant MFA for Essential 8 compliance Learn six deployment best practices that can help you accelerate the adoption of modern, phishing-resistant MFA at scale using the YubiKey. Read more -
How to get started with phishing-resistant MFA to secure federal systems integrators Explore best practices for implementing phishing-resistant multi-factor authentication (MFA) tailored for Federal Systems Integrators (FSIs) to enhance security against sophisticated cyber threats. Read more -
What is FIDO and why is it important for business security? Learn what FIDO is, how it works, and how your organization can benefit from deploying FIDO-based authentication across critical business scenarios. Read more -
Securing the world’s critical infrastructure against modern cyber threats Learn how to safeguard IT/OT systems and the supply chain with Zero Trust using phishing-resistant MFA and hardware-backed security. Read more -
How to get started with phishing-resistant MFA to secure pharmaceuticals Learn the six deployment best practices that can help the pharmaceutical industry accelerate adoption of modern, phishing-resistant MFA at scale using the YubiKey. Read more -
How to get started with phishing-resistant MFA to secure telecommunications Learn deployment best practices to accelerate adoption at scale and secure your organization from account takeovers for telecommunications. Read more