Resource Category: White papers and reports
-
State and local government best practices guide Learn the six deployment best practices that can help your agency accelerate adoption of modern, phishing-resistant MFA at scale. Read more -
Building a phishing-resistant enterprise with device-bound passkeys Building an enterprise that stops account takeovers with phishing-resistant MFA using a device-bound passkey strategy. Read more -
How to get started with phishing-resistant MFA to secure healthcare Download the healthcare best practices guide to learn six deployment best practices to accelerate adoption at scale. Read more -
Secure your AWS environment with highest-assurance phishing-resistant MFA Download the best practice guide to learn more how you can stop account takeovers and go passwordless for a wide variety of AWS use cases Read more -
Securing remote workers with phishing-resistant MFA Learn why legacy authentication such as usernames and passwords, and mobile-based authenticators don’t protect remote workers against phishing attacks and account takeovers, and how the YubiKey ensures phishing-resistant multi-factor and passwordless authentication for critical remote work authentication business scenarios. Read more -
Cyber hygiene: Enterprise resource guide for getting started with your YubiKey The YubiKey works with hundreds of applications and services, making strong security across multiple accounts simple and effective. Yubico is giving you a jumpstart on your multi-factor authentication journey by providing an enterprise resource guide to help you get your YubiKey up and running to protect applications and services within your organization. Download our ‘Enterprise […] Read more -
How to get started with phishing-resistant MFA for your Microsoft environment Learn about the six key best practices to accelerate the adoption of phishing-resistant MFA and how to ensure secure Microsoft environments. Read more -
Secure your AWS environment phishing-resistant MFA Explore the YubiKey by Yubico for secure AWS authentication: phishing-resistant, multi-protocol support, and easy integration. Read more -
AWS Best practices guide Download this Best Practices Guide to learn about six deployment best practices to accelerate your adoption of phishing-resistant MFA for your AWS environment at scale. Read more -
Modernizing authentication across the Department of Defense with phishing-resistant MFA Learn how the DOD-approved and FIPS 140-2 validated YubiKey is helping the federal government with phishing-resistant multi-factor authentication (MFA) for modern use cases not supported by the PIV and CAC Read more