Resources
Browse our library of white papers, webinars, case studies, product briefs, and more.
- All Categories
- Product briefs
- Solution briefs
- Webinars
- White papers and reports
- Navigate the evolving threat of phishing and social engineering with passkeys
Join this session to learn about the evolving threat landscape and how becoming a phishing-resistant user and using the right passkey approach can help stop account takeovers in their tracks.
Read more - Powering stronger cyber defenses in the energy sector
Learn how energy and natural resource organizations can protect themselves with modern phishing-resistant authentication (MFA).
Read more - Creating phishing-resistant users across financial services in a passkey age
Download the Yubico e-book, Creating phishing-resistant users across financial services in a passkey age, to learn about the difference between synced passkeys and device-bound passkeys.
Read more - Protecting insurance organizations against modern cyber threats
Learn how insurance organizations can alleviate cyber risk by cultivating phishing-resistant users using the YubiKey for phishing-resistant multi-factor and passwordless authentication.
Read more - Drive business continuity and cyber resilience with modern FIDO security keys
Learn how modern FIDO security keys drive business continuity and cyber resilience while creating always-on enterprises.
Read more - Embracing critical infrastructure security and resilience with phishing-resistant MFA
Learn why the YubiKey for phishing-resistant authentication should be an important part of your cybersecurity strategy to mitigate cyber risk and protect the business continuity of critical infrastructure sectors.
Read more - 2024 Gartner® Hype Cycle™ for Digital Identity
Learn about the growing adoption in FIDO and the business impact and different tradeoffs for device-bound passkeys and multidevice passkeys. See how modern authentication and the most secure device-bound passkeys from Yubico fit in the overall hype cycle of developing identity protection technologies.
Read more - 2024 State of Global Authentication: Tackling Cyberthreats at Work & Home
Join us to dive into how cybersecurity impacts our daily lives and businesses, and learn about the risks of poor security practices. We’ll break down what makes a solid cybersecurity plan that covers both personal and professional spaces, including tips on using stronger authentication methods to fend off phishing attempts.
Read more - NIS2 Compliance
The NIS2 Directive, effective January 2023, expands the scope of the original NIS Directive to include stricter cybersecurity requirements across more sectors in the EU. It mandates enhanced security measures like incident reporting, multi-factor authentication, and supply chain security, with penalties for non-compliance reaching up to €10M or 2% of annual revenue. Organizations must ensure compliance by October 2024 to avoid significant fines and operational risks.
Read more