Resource Category: White papers and reports
-
Secure your AWS environment phishing-resistant MFA Explore the YubiKey by Yubico for secure AWS authentication: phishing-resistant, multi-protocol support, and easy integration. Read more AWS MFA phishing-resistant authentication -
AWS Best practices guide Download this Best Practices Guide to learn about six deployment best practices to accelerate your adoption of phishing-resistant MFA for your AWS environment at scale. Read more AWS best practices guide phishing-resistant MFA -
Modernizing authentication across the Department of Defense with phishing-resistant MFA Learn how the DOD-approved and FIPS 140-2 validated YubiKey is helping the federal government with phishing-resistant multi-factor authentication (MFA) for modern use cases not supported by the PIV and CAC Read more government modern authentication phishing-resistant authentication -
How to get started with passwordless using device-bound passkeys Read the Yubico deployment best practices guide to get started with device-bound passkeys for your passwordless authentication journey. Read more best practices guide passkeys passwordless YubiKey -
Safeguard your Microsoft ecosystem with a Zero Trust strategy Learn why there is a critical need for phishing-resistant MFA to support Zero Trust for Microsoft environments. Read more Microsoft phishing-resistant MFA YubiKey zero trust -
Transcending Passwords: The Next Generation of Authentication The report exposes the business impact of authentication practices, with consequences for security, productivity and employee retention. Read more authentication cybersecurity passwordless -
Yubico and Okta: Raising the bar for security Download the Yubico and Okta eBook to learn the importance of a strong security posture and actions you can take today to secure your organization’s future. Read more cybersecurity Okta phishing-resistant MFA -
Protecting Federal Systems Integrators Learn how phishing-resistant MFA can help federal systems integrators stop phishing attacks and account takeovers with phishing-resistant MFA Read more account takeovers phishing-resistant MFA ransomware -
Manufacturers across the globe are investing in modern authentication See real stories of how global manufacturers and other leading brands changed the game for modern enterprise authentication security. Read more cybersecurity manufacturing supply chain YubiKey -
Energy and Natural Resources Deployment Best Practices Guide Learn the six deployment best practices that can help accelerate the adoption of modern, phishing-resistant MFA at scale using the YubiKey. Read more best practices guide energy and natural resources YubiKey