Resource Category: White papers and reports
-
Yubico and Okta: Raising the bar for security Download the Yubico and Okta eBook to learn the importance of a strong security posture and actions you can take today to secure your organization’s future. Read more cybersecurity Okta phishing-resistant MFA -
Protecting Federal Systems Integrators Learn how phishing-resistant MFA can help federal systems integrators stop phishing attacks and account takeovers with phishing-resistant MFA Read more account takeovers phishing-resistant MFA ransomware -
Manufacturers across the globe are investing in modern authentication See real stories of how global manufacturers and other leading brands changed the game for modern enterprise authentication security. Read more cybersecurity manufacturing supply chain YubiKey -
Energy and Natural Resources Deployment Best Practices Guide Learn the six deployment best practices that can help accelerate the adoption of modern, phishing-resistant MFA at scale using the YubiKey. Read more best practices guide energy and natural resources YubiKey -
Retail and Hospitality Deployment Best Practices Guide Learn deployment best practices for retail and hospitality to accelerate adoption of phishing-resistant MFA at scale using the YubiKey. Read more best practices guide phishing-resistant MFA retail and hospitality -
The dark side of your mobile authentication strategy Learn the key misconceptions related to mobile-based MFA that are putting your organization at risk of being hacked. Read more mobile authentication phishing-resistant MFA -
Not all MFA is created equal ebook Explore advanced MFA methods and boost online security with Yubico’s expert insights. Download now for essential digital protection. Read more MFA phishing-resistant authentication -
How to get started with modern, phishing-resistant MFA Learn the six deployment best practices that can help your organization accelerate the adoption of modern, phishing-resistant MFA at scale using YubiKeys. Read more modern authentication phishing-resistant MFA -
Federal Government Deployment Best Practices Guide Learn the six deployment best practices that can help your agency accelerate adoption of modern, phishing-resistant MFA at scale using the YubiKey. Read more best practices guide federal government zero trust -
Cybersecurity Insiders report: Path to Zero Trust Rapid digital transformation, increased remote work, and evolving cybersecurity threats have catapulted Zero Trust from an IT buzzword to a foundational cybersecurity model. In our comprehensive report, “The Path to Zero Trust: Industry Insights and Best Practices”, we delve into the latest adoption trends, challenges, and the current state of Zero Trust, based on a […] Read more cybersecurity zero trust