Resource Category: White papers and reports
Stay up to date on company and partner news, product tips, and industry trends.
-
Modern hardware-backed MFA and compliance for Federal Government: How the YubiKey meets US Federal Government regulations
Learn how the YubiKey, a DOD approved alternate authenticator meets federal PIV/CAC requirements and government compliance regulations.
Read more -
Modern Authentication for the Federal Government: Enabling Mobile, Secure Authentication in Zero Trust Environments
Learn how DOD approved hardware security keys such as the YubiKey are ideal to fill PIV and CAC related authentication gaps across the federal government, and meet the MFA mandate in the Biden Executive Order 14028.
Read more -
Securing Your Critical Assets in an Ever-Changing Regulatory Environment: Yubico Compliance E-book
Learn how the YubiKey helps organizations meet global compliance regulations including FIPS, GDPR, HIPAA and others with modern strong authentication.
Read more -
Cybersecurity in the Work From Anywhere Era: Findings on Employee Attitudes and Adaptability to At-Home Corporate Security
Read more to learn about findings on Employee Attitudes and Adaptability to At-Home Corporate Security
Read more -
Bridge to Passwordles: Seven Steps to Execute a Smooth Passwordless Implementation
Learn about the key considerations to take into account when determining your path to passwordless
Read more -
SANS 2021 Password Management and Two-Factor Authentication Methods Survey
Read this report to learn about password management and the types of MFA solutions being used in industries
Read more -
State of Alert: Multi-factor authentication and the future of data
Read this report to learn why multi-factor authentication is critical for state and local government agencies, the consequences of not strengthening authentication, and how to bridge to a passwordless future
Read more -
Bridge to Passwordless: Key Considerations When Building a Secure Passwordless Strategy
Learn about the key considerations to take into account when determining your path to passwordless, so that you can enhance organizational security while delivering users a fast and easy user experience.
Read more -
Bridge to Passwordless: Separating fact from fiction in your journey
“Passwordless” can feel like a loaded term, with the security industry filled with differing and contradictory positions on the topic. The purpose of this whitepaper is to take an objective approach to understand the challenges that passwords present, what “passwordless” means, and what enterprises can expect moving forward as passwordless authentication matures.
Read more -
Osterman Cyber Security in Government
Learn how the government sector faces a growing complex of cybersecurity threats.
Read more