Resource Category: White papers and reports

  • Yubico and Okta ebook coverYubico and Okta: Raising the bar for securityDownload the Yubico and Okta eBook to learn the importance of a strong security posture and actions you can take today to secure your organization’s future.Read morecybersecurityOktaphishing-resistant MFA
  • manufacturing user stories brochure feature page imageManufacturers across the globe are investing in modern authenticationSee real stories of how global manufacturers and other leading brands changed the game for modern enterprise authentication security.Read morecybersecuritymanufacturingsupply chainYubiKey
  • energy and natural resources best practice guide feature imageEnergy and Natural Resources Deployment Best Practices GuideLearn the six deployment best practices that can help accelerate the adoption of modern, phishing-resistant MFA at scale using the YubiKey.Read morebest practices guideenergy and natural resourcesYubiKey
  • retail and hospitality best practices guide coverRetail and Hospitality Deployment Best Practices GuideLearn deployment best practices for retail and hospitality to accelerate adoption of phishing-resistant MFA at scale using the YubiKey.Read morebest practices guidephishing-resistant MFAretail and hospitality
  • user on mobile deviceThe dark side of your mobile authentication strategyLearn the key misconceptions related to mobile-based MFA that are putting your organization at risk of being hacked. Read moremobile authenticationphishing-resistant MFA
  • Not all MFA is created equal ebookExplore advanced MFA methods and boost online security with Yubico’s expert insights. Download now for essential digital protection.Read moreMFAphishing-resistant authentication
  • phishing-resistant best practice guide coverHow to get started with modern, phishing-resistant MFALearn the six deployment best practices that can help your organization accelerate the adoption of modern, phishing-resistant MFA at scale using YubiKeys.Read moremodern authenticationphishing-resistant MFA
  • Federal best practices guide previewFederal Government Deployment Best Practices GuideLearn the six deployment best practices that can help your agency accelerate adoption of modern, phishing-resistant MFA at scale using the YubiKey.Read morebest practices guidefederal governmentzero trust
  • Zero Trust survey previewCybersecurity Insiders report: Path to Zero TrustRapid digital transformation, increased remote work, and evolving cybersecurity threats have catapulted Zero Trust from an IT buzzword to a foundational cybersecurity model. In our comprehensive report, “The Path to Zero Trust: Industry Insights and Best Practices”, we delve into the latest adoption trends, challenges, and the current state of Zero Trust, based on a […]Read morecybersecurityzero trust