Resource Category: White papers and reports

  • energy white paper imageSecuring energy and natural resources against modern cyber threatsLearn the critical need for phishing-resistant multi-factor authentication to safeguard this critical infrastructure and authentication best practices to close the critical threat gap that emerges from legacy authentication.Read moreenergy and natural resourcesmodern authenticationoil and gasphishing-resistant MFA
  • venable white paperHow governments and higher education can achieve 100% MFALearn how state and local governments and higher education can drive 100 percent MFA coverage to protect against phishing and account takeoversRead moreeducationphishing-resistant MFAstate and local government
  • Graduating from legacy MFA to modern authenticationDownload the Yubico White Paper, Graduating from legacy MFA to modern authentication: The critical need for increased security across education, to learn authentication best practices in modernizing authentication to stop modern day cyber threats.Read moreauthenticationeducationMFA
  • Protecting the supply chain with highest-assurance securityDownload the Yubico White Paper, Protecting the supply chain with highest-assurance security: Go passwordless, ensure product integrity, and protect the software supply chain, to learn authentication best practices in securing supply chain integrity.Read moreMFAsupply chain
  • man with machineProtecting manufacturing with highest-assurance securityLearn how to secure manufacturing organizations and the importance of strong security and phishing-resistant MFA.Read moremanufacturingsecurity
  • Maximizing security for pharma with phishing-resistant MFARead this white paper to learn how to achieve phishing-resistant MFA and passwordless across the pharmaceutical industryRead moredigital transformationhealthcarePharmaphishing-resistant MFA
  • woman working at computerBest practices for securing mobile-restricted environmentsLearn security best practices to secure mobile-restricted environments where users can’t, won’t, or don’t use a mobile phone, and therefore weak forms of protection such as mobile authentication is simply not even an option.Read more
  • Why legacy authentication is putting your users at riskStep one in any effective cyber security program includes securing privileged accounts, credentials, and secrets with modern strong authentication. Download the Yubico White Paper, The critical strong authentication need for privileged users, to learn who really is a privileged user, and industry best practices to secure your privileged users against phishing attacks and account takeovers.Read moreauthenticationprivileged users
  • shared workstations featured imageSecuring shared workstations against modern cyber threatsDownload the Yubico White Paper, to learn the key considerations for authentication across shared workstation environments such as call centers, manufacturing floors, retail and hospitality kiosks, medical stations, and others. Read morephishingphishing-resistant MFAshared workstation
  • How State and Local Governments Combat Account TakeoversRead how state and local governments are securing workers, election infrastructure, and digital services using the YubiKey for strong authenticationRead moregovernmentstate and local governmentstrong authentication