Resource Category: White papers and reports

  • What is FIDO and why is it important for business security? cover imageWhat is FIDO and why is it important for business security?Learn what FIDO is, how it works, and how your organization can benefit from deploying FIDO-based authentication across critical business scenarios.Read moreFIDOMFApasswordlessstrong authentication
  • Securing critical infrastructure white paper cover imageSecuring the world’s critical infrastructure against modern cyber threatsLearn how to safeguard IT/OT systems and the supply chain with Zero Trust using phishing-resistant MFA and hardware-backed security. Read morecritical infrastructurephishing-resistant MFAzero trust
  • pharmaceuticals best practices guide featured imageHow to get started with phishing-resistant MFA to secure pharmaceuticalsLearn the six deployment best practices that can help the pharmaceutical industry accelerate adoption of modern, phishing-resistant MFA at scale using the YubiKey.Read morebest practices guidePharmaphishing-resistant MFAYubiKey
  • How to get started with phishing-resistant MFA to secure telecommunicationsLearn deployment best practices to accelerate adoption at scale and secure your organization from account takeovers for telecommunications.Read morephishing-resistant MFATelecommunicationYubico
  • state and local best practices featured imageState and local government best practices guideLearn the six deployment best practices that can help your agency accelerate adoption of modern, phishing-resistant MFA at scale.Read morebest practices guidephishing-resistant MFAstate and local governmentYubiKey
  • healthcare best practice guide previewHow to get started with phishing-resistant MFA to secure healthcareDownload the healthcare best practices guide to learn six deployment best practices to accelerate adoption at scale.Read morebest practices guidehealthcare
  • AWS best practice guide previewSecure your AWS environment with highest-assurance phishing-resistant MFADownload the best practice guide to learn more how you can stop account takeovers and go passwordless for a wide variety of AWS use casesRead moreAWSpasswordlessphishing-resistant MFA
  • secure remote workersSecuring remote workers with phishing-resistant MFALearn why legacy authentication such as usernames and passwords, and mobile-based authenticators don’t protect remote workers against phishing attacks and account takeovers, and how the YubiKey ensures phishing-resistant multi-factor and passwordless authentication for critical remote work authentication business scenarios.Read morephishing-resistant MFAremote and hybrid workersYubiKey
  • yubikey resource guide for enterprises featured imageCyber hygiene: Enterprise resource guide for getting started with your YubiKeyThe YubiKey works with hundreds of applications and services, making strong security across multiple accounts simple and effective.  Yubico is giving you a jumpstart on your multi-factor authentication journey by providing an enterprise resource guide to help you get your YubiKey up and running to protect applications and services within your organization. Download our ‘Enterprise […]Read morecybersecurityEnterprisesecurity