• Resources

    Browse our library of white papers, webinars, case studies, product briefs, and more.
    Home » Resources » Resource library
    • All Categories
    • Product briefs
    • Solution briefs
    • Webinars
    • White papers and reports
    • Proactive Security for Privileged UsersBuilding cyber resilient financial services through proactive security for privileged usersRead more
    • Passkeys Done RightLearn more about phishing-resistant, passwordless enterprise deployment with YubiKeys.Read more
    • 2025 Gartner® Hype Cycle™ for Digital IdentityExplore this report to gain insights on: critical market insights, passkeys trends and business impact and drivers.Read moreDevice-bound passkeysMFApasskeyspasswordlessphishing-resistant MFAuser authentication
    • Seamless security for your Microsoft ecosystemNot all MFA is created equal—the YubiKey provides phishing-resistant protection at every stage of your Microsoft journey The YubiKey is a modern multi-protocol hardware security key supporting Smart Card (PIV) and FIDO that delivers an optimized user experience and offers phishing-resistant two-factor, multi-factor authentication (MFA) and passwordless authentication at scale across Microsoft environments. The YubiKey […]Read more
    • brief coverStop fraud with secure customer bankingDownload this free asset to learn the six best practices to protect end customers from digital banking scams.Read more
    • white paper coverSecuring financial services with proactive passwordless securityWith the cyberthreat landscape becoming more sophisticated, read this white paper to learn how proactive, passwordless security using hardware passkeys can help.Read more
    • white paper coverStop banking fraud and secure retail and commercial bankingLearn how banks and financial institutions can deliver highest security and the best user experience for retail and commercial banking customers using scalable device-bound passkey solutions.Read more
    • brief coverBuild Cyber Resilience for ManufacturingLearn our top recommendations to accelerate your Zero Trust approach, prioritize operational resilience, and build a cyber resilient authentication strategy. Read more
    • white paper coverModernizing authentication to support cyber resilienceLearn about the most commonly overlooked authentication vulnerabilities that increase cyber risk, how to mitigate these risks, and what contingency measures can be put in place to maintain or restore access in the event of disruption.Read more
    • Modern authentication for Defense and Domestic OperationsDownload the free brochure to learn how the YubiKey solves authentication use cases for the National Guard and Domestic Operations.Read more
    • How state and local governments are deploying modern authenticationLearn more about how state and local governments around the world are using YubiKeys to go passwordless, drive compliance and accelerate Zero Trust.Read more
    • Securing the future of financeLearn how financial institutions can enhance security, streamline operations, and foster customer trust with Yubico and HYPR.Read more
    • 2025 Gartner® Innovation Insight for Many Flavors of Authentication TokenLearn key findings for mitigating risks and planning for migration to phishing-resistant MFA.Read moreDevice-bound passkeysMFApasskeyspasswordlessphishing-resistant MFAuser authenticationYubiKeys
    • Think "good enough" is enough? Think again about mobile devices as authenticators webinar imageThink “good enough” is enough? Think again about mobile devices as authenticatorsExplore the hidden costs and pitfalls of using mobile devices as authenticators. We’ll dive into critical factors such as the user lifecycle, security, phishing resistance, user experience, management, and total cost of ownership.Read moremobile authenticationphishing-resistant MFAYubiKey
    • Beyond passwords: How Okta secured their global workforce with Yubico webinar cover imageBeyond passwords: How Okta secured their global workforce with YubicoJoin Yubico and Okta to learn first-hand about some of the challenges that Okta faced and why they chose Yubico as their partner to deliver a large-scale, global, solution with the highest level of phishing-resistant assurance.Read moreOktapasswordlessphishing-resistant MFAYubiKey
    • Lions, Tigers, Bears…and MFA Mandates? Oh my! webinar cover imageLions, Tigers, Bears…and MFA Mandates? Oh my!Join us as we demystify MFA mandates and give you the tools to confidently navigate this evolving landscape.Read morecomplianceMFA mandatesphishing-resistant MFA
    • Progression of MFA: How Yubico and key partners work together to provide solutions that make an impact datasheetThe progression of MFA: How Yubico and key partners work together to provide solutions that make an impactDownload our exclusive datasheet and take the first step towards enhancing your organization’s security posture.Read moreMFAphishing-resistant MFAYubiKey
    • Modern Authentication Featured ImageProtecting the supply chain across the DIB with modern authenticationLearn how Yubico can help secure critical and modern IT and OT use cases across the Defense Industrial Base (DIB) manufacturing sector.Read moreauthenticationphishing-resistant MFAYubicoYubiKey
    • brochure image resource listingPhishing-resistant MFA for educationLearn how you can stop successful cyber attacks in education by cultivating phishing-resistant users across faculty, staff and students.Read morecybersecurityphishing-resistant MFAYubiKey
    • Navigating cyber threats: Building resilience with Yubico and Microsoft webinar cover imageNavigating cyber threats: Building resilience with Yubico and Microsoft Join us to learn what Chad Thunberg, Yubico CISO, and Derek Hanson, Yubico VP of Alliances, have to say about cyber resiliency.Read morecyber resilienceMicrosoftpasswordlessphishing-resistant MFA
    • Brochure resource image listingModernizing authentication across global critical infrastructureLearn from global critical infrastructure organizations about their journey deploying modern authentication with hardware-backed passkeys to protect from modern cyber threats.Read moresecuring critical infrastructureYubicoYubiHSMYubiKey
    • brochure image resource listingPhishing-resistant users: The next evolution in authenticationProtect your enterprise from phishing and social engineering with YubiKey, ensuring phishing resistant authentication wherever users work.Read moreEnterprisephishing-resistant authenticationYubico
    • Cyber risk management guide for authentication in manufacturing coverModernizing authentication
across retail and hospitalityRead this brochure to learn from global retail and hospitality organizations about their journey deploying modern authentication with hardware-backed passkeys to protect from modern cyber threats. Read moreretail and hospitalityYubiKey
    • Cyber risk management guide for authentication in manufacturing coverCyber risk management guide for authentication in manufacturingIn this guide, we will outline how to identify, assess, and prioritize risk mitigation strategies that respect the constraints of today while also creating a bridge to modern, phishing-resistant multi-factor authentication (MFA) and passwordless.Read moremanufacturingpasswordlessphishing-resistant MFA
    • Doable and durable cyber defenses for manufacturers webinar coverDoable and durable cyber defenses for manufacturersJoin us and learn more during this session from our three guests about the cyber threats manufacturers face every day and get guidance on strengthening your defenses—for a secure and resilient 2025.Read morecyber resiliencemanufacturersphishing-resistant MFA
    • Yubico and Okta infographic cover imagePhishing-Resistant Security: Okta’s Early Adoption of Yubico FIDO Pre-regDownload this free infographic to learn more about how Okta became an early adopter of Yubico FIDO Pre-reg, deploying YubiKeys to its entire global workforce to establish an end-to-end phishing-resistant authentication experience.Read moreOktaphishing-resistant MFAYubico FIDO Pre-reg
    • DORA compliance ebook coverPrepare for DORA Compliance with the YubiKeyLearn how Yubico solutions can help your organization prepare for DORA Compliance.Read morecomplianceDORAphishing-resistant MFAYubiKey
    • SmartIndustry ebook coverCybersecurity for manufacturersIn partnership with Smart Industry and Yubico, explore this ebook to learn how to secure manufacturing operations from the factory floor to the boardroom, including OT and IT systems and data, from modern cyber threats.Read morecybersecuritymanufacturingphishing-resistant MFA
    • Remaining cyber resilient: Top recommendations for 2025 webinar cover imageRemaining cyber resilient: Top recommendations for 2025With 2024 soon to be in the rear view mirror, prepare for a safe 2025 by attending this webinar to learn what organizations and individuals should be prioritizing to become phishing-resistant users and become cyber resilient against an ever evolving cyber threat landscape.Read morecyber resiliencepasswordlessphishing-resistant MFAzero trust
    • Securing shared workstations in manufacturing against modern cyber threats white paper coverSecuring shared workstations in manufacturing against modern cyber threatsDownload the Yubico white paper to learn the key considerations for authentication across manufacturing shared workstation environments.Read moremanufacturingphishing-resistant MFAshared workstations
    • Yubico LogoYubico’s white glove serviceLearn how you can simplify security and streamline global distribution of YubiKeys at scale with Yubico’s white glove service. Read more
    • Yubico Enrollment Suite solution brief previewYubico Enrollment SuiteDownload this brief to learn how Yubico helps organizations pre-enroll YubiKeys, reducing IT burden and enabling phishing-resistant, passwordless users.Read morepasswordlessphishing-resistant MFA
    • Yubico FIDO pre-reg with Okta best practice guide previewHow to create phishing-resistant users with fast, out-of-the box YubiKey FIDO activation with OktaGet started on building phishing-resistant security with Yubico FIDO Pre-reg and Okta! For a successful YubiKey deployment, download the guide. This resource outlines a six-step process covering planning, validation, integration, launch, adoption, and success measurement—providing essential strategies to help organizations enhance security and operational efficiency with phishing-resistant MFA.Read moreOktapasskeypasswordlessphishing-resistant MFA
    • Streamline Phishing-Resistant MFA: Simplified Passkey Provisioning with Microsoft and Yubico webinar cover imageStreamline Phishing-Resistant MFA: Simplified Passkey Provisioning with Microsoft and YubicoJoin us as we explore the seamless adoption of phishing-resistant multi-factor authentication (MFA) through Microsoft’s new Entra ID passkey (FIDO2) provisioning APIs.Read moreAPIsMicrosoftphishing-resistant MFAYubiKey
    • Yubico and Versasec: Strengthening Cybersecurity in the Middle East webinar cover imageYubico and Versasec: Strengthening Cybersecurity in the Middle EastJoin us as we explore the ever-growing cyber threats and the essential role that enterprise multi-factor authentication (MFA) plays in enhancing security.Read morecybersecurityphishing-resistant MFAYubiKey
    • AI cyber threats: 30 minutes to midnight webinar cover imageAI cyber threats: 30 minutes to midnightJoin us to learn about the present and future state of AI phishing and how to tackle both today’s and tomorrow’s cyber threats.Read moreAIpasswordlessphishing-resistant MFA
    • Phishing-resistant MFA accelerates enterprises to passwordless webinar cover imagePhishing-resistant MFA accelerates enterprises to passwordlessJoin this session to learn how to secure your infrastructure with phishing-resistant MFA and begin your journey to passwordless authentication.Read morepasswordlessphishing-resistant MFAYubiKey
    • YubiKey as a Service coverYubiKey as a Service Solution BriefA modern way to adopt phishing-resistant MFA and passwordless over traditional perpetual purchasing models. Download the brief to learn more.Read morepasswordlessphishing-resistant MFAYubiKey as a Service
    • Navigate the evolving threat of phishing and social engineering with passkeys webinar cover imageNavigate the evolving threat of phishing and social engineering with passkeysJoin this session to learn about the evolving threat landscape and how becoming a phishing-resistant user and using the right passkey approach can help stop account takeovers in their tracks.Read morepasskeysphishing-resistant usersstop account takeovers
    • image of brief snapshotPowering stronger cyber defenses in the energy sectorLearn how energy and natural resource organizations can protect themselves with modern phishing-resistant authentication (MFA).Read moreenergyoil and gasYubiHSMYubiKey
    • tablet screenCreating phishing-resistant users across financial services in a passkey ageDownload the Yubico e-book, Creating phishing-resistant users across financial services in a passkey age, to learn about the difference between synced passkeys and device-bound passkeys.Read more
    • Protecting insurance organizations against modern cyber threats white paper coverProtecting insurance organizations against modern cyber threatsLearn how insurance organizations can alleviate cyber risk by cultivating phishing-resistant users using the YubiKey for phishing-resistant multi-factor and passwordless authentication.Read moreinsurancephishing-resistant MFAYubiKey
    • Drive business continuity and cyber resilience with modern FIDO security keys visual industry brief coverDrive business continuity and cyber resilience with modern FIDO security keysLearn how modern FIDO security keys drive business continuity and cyber resilience while creating always-on enterprises.Read morecyber resilienceFIDOYubiKey
    • Embracing critical infrastructure security and resilience solution brief coverEmbracing critical infrastructure security and resilience with phishing-resistant MFALearn why the YubiKey for phishing-resistant authentication should be an important part of your cybersecurity strategy to mitigate cyber risk and protect the business continuity of critical infrastructure sectors.Read morecritical infrastructurecyber resiliencephishing-resistant MFA
    • 2024 State of Global Authentication: Tackling Cyberthreats at Work & Home webinar cover image2024 State of Global Authentication: Tackling Cyberthreats at Work & HomeJoin us to dive into how cybersecurity impacts our daily lives and businesses, and learn about the risks of poor security practices. We’ll break down what makes a solid cybersecurity plan that covers both personal and professional spaces, including tips on using stronger authentication methods to fend off phishing attempts.Read morebest practicescybersecurityphishing-resistant MFA
    • nis2NIS2 ComplianceThe NIS2 Directive, effective January 2023, expands the scope of the original NIS Directive to include stricter cybersecurity requirements across more sectors in the EU. It mandates enhanced security measures like incident reporting, multi-factor authentication, and supply chain security, with penalties for non-compliance reaching up to €10M or 2% of annual revenue. Organizations must ensure compliance by October 2024 to avoid significant fines and operational risks.Read morecompliancenis2YubiKey
    • best practices guide for education cover imageHow to get started with the YubiKey for educationLearn the six deployment best practices to protect your education organization from cyberattacks and accelerate adoption at scale. Read morebest practices guidedeploymenteducationYubiKey
    • high tech company brochure previewModern authentication for high-tech manufacturersDownload this free brochure to learn how Yubico solutions safeguard critical IT and OT systems, sensitive IP, and the supply chain for high tech manufacturers. Read morehigh-techmanufacturingmodern authentication
    • Build cyber resilience with Yubico and Microsoft to accelerate to passwordless cover imageBuild cyber resilience with Yubico and Microsoft to accelerate to passwordlessJoin us as we investigate lessons learned from incidents such as Crowdstrike and MGM Grand, and examine different passkey solutions and how they fit into building a resilient, phishing-resistant organization.Read morecyber resilienceMicrosoftpasswordlessphishing-resistant MFA
    • EMA report previewThe evolving threat of phishing and social engineeringThe report classifies the three major passkey credentials in the market and highlights the benefits of creating phishing-resistant users.Read more
    • Yubico and CQURE webinar cover imageActive Directory Security Management: From Threat Detection to Effective ResponseJoin us for this informative session to enhance your AD security management skills and safeguard your organization’s critical assets.Read moreActive Directorycybersecurityphishing-resistant MFAYubiKey
    • Securing Your Organization with YubiKeys at Scale - Part 2 webinar cover imageSecuring Your Organization with YubiKeys at Scale – Part 2Join us for this in-depth session as we navigate the YubiKey journey, equipping you with the knowledge and tools to elevate your organization’s rollout strategy with confidence.Read moredeploymentphishing-resistant MFAYubiKey
    • demystifying passkeys visual industry brief cover imageDemystifying passkeysOrganizations can avail of three different types of passkey implementations but it is vital to choose the right passkey approach based on your organization’s required security and risk posture. View the Yubico visual industry brief to learn more.Read morepasskeyspasswordlessphishing-resistant usersYubiKey
    • Going passwordless in a passkey age white paper coverGoing passwordless in a passkey ageRead the Yubico white paper to get real guidance on how enterprises can evaluate passwordless authentication options in the age of passkeys. This white paper discusses how enterprises can address and mitigate current and future issues with a sound passwordless deployment.Read morepasskeyspasswordlessYubiKey
    • Phishing-Resistant Insurance EnterprisesProtect your insurance organization from costly phishing attacks and data breaches with YubiKey’s phishing-resistant authentication. Learn how to enhance security, save on mobile costs, and improve user experience.Read moreenterprise securityinsurancephishing-resistant users
    • Modern authentication for the ArmyDownload the free brochure to learn how the YubiKey solves U.S. Army authentication modernization use cases.Read moremodern authenticationYubiKeyzero trust
    • YubiKey as a Service coverYubiKey as a Service product briefLearn how YubiKey as a Service can help you accelerate to passwordless and create phishing-resistant users across the enterprise.Read moreEnterpriseYubiKey as a Service
    • going passwordless and meeting CJIS at city of southgate webinar cover imageGoing passwordless and meeting CJIS at City of SouthgateJoin us for a candid discussion with Jason Rucker, Director of IT, City of Southgate, and Robb Ervin, Sr Solutions Engineer, Yubico to learn about the goals, timelines, obstacles and wins along their passwordless deployment journey.Read moreCJISdeploymentpasswordlessYubiKey
    • Essential Eight best practices guide previewHow to get started with phishing-resistant MFA for Essential 8 complianceLearn six deployment best practices that can help you accelerate the adoption of modern, phishing-resistant MFA at scale using the YubiKey.Read morebest practices guidecompliancephishing-resistant MFA
    • Yubico LogoHow to get started with phishing-resistant MFA for Essential 8 compliance thank youWe hope you enjoy reading the Yubico Best Practices Guide, How to get started with phishing-resistant MFA for Essential 8 compliance.Read more
    • military personnel looking at laptopEnhancing Federal Security: Issuing PIV-Compatible Credentials with Axiad Cloud (FedRAMP) and YubicoJoin this webinar to gain a comprehensive understanding of how you can streamline the credentialing process and ensure compliance with federal standards while enhancing security and efficiency.Read moregovernmentphishing-resistant MFAPIVYubiKey
    • Create phishing-resistant users and accelerate your enterprise to passwordless webinar cover imageCreate phishing-resistant users and accelerate your enterprise to passwordlessWatch this webinar to learn how phishing-resistant users create phishing-resistant enterprises that can accelerate to enhanced security and operational efficiency, all within a modern passwordless environment.Read morepasswordlessphishing-resistant usersYubiKey
    • Build robust cybersecurity postures with cyber insurance & modern authentication webinar coverBuild robust cybersecurity postures with cyber insurance & modern authenticationBrent Deterding, CISO, Afni and Davis Hake, Co-founder, Insurtech, discuss the current cybersecurity and cyber insurance landscape and how leaders of today and tomorrow should be planning for the new age of cyber offense without breaking the bank.Read morecyber insurancecybersecuritypasswordlessphishing-resistant users
    • voting boothThe importance of cybersecurity and the impact of AI on the 2024 electionsJoin Yubico and Defending Digital Campaigns for this webinar as they dive into their recent survey results.Read moreelections and political campaignsMFA
    • Every user is a privileged user visual industry brief coverEvery user is a privileged userThe idea of “privileged users” has expanded beyond the IT function to include any business users who possess access to exploitable systems or IP, making all users target of sophisticated cyber attacks. Learn how to cultivate phishing-resistant users with modern, phishing-resistant multi-factor authentication (MFA).Read morephishing-resistant MFAphishing-resistant usersprivileged usersYubiKey
    • securing federal systems solution brief featured imageSecuring federal systems integrators and the defense industrial base with modern authenticationFSIs have access to critical systems and hold large volumes of sensitive and Controlled Unclassified Information (CUI), making them targets of sophisticated cyber attacks. Any MFA is better than a password, but not all MFA is created equal. Download the visual industry brief to learn how FSIs and the DIB can protect themselves with modern, phishing-resistant multi-factor authentication (MFA).Read morefederal governmentfederal systems integratorsphishing-resistant MFA
    • Supercharging telcos against modern cyber threats infographic cover imageSupercharging telcos against modern cyber threatsLearn why it is critical that phishing-resistant authentication be the first line of defense for telecommunication organizations.Read moremodern cyber threatsphishing-resistant MFATelecommunication
    • 5.7 firmware product brief previewWhat’s new in YubiKey 5.7The new YubiKey 5.7 firmware fast-tracks enterprises to passwordless authentication with a secure, simple, and scalable solution that ensures the highest assurance authentication for modern enterprises.Read moreenterprise securitypasswordlessYubiKey 5.7
    • Unlocking the future: Fast-tracking modern enterprises to passwordless webinar cover imageUnlocking the future: Fast-tracking modern enterprises to passwordlessJoin this webinar to discover how Yubico’s latest innovations in YubiKey 5.7 enhance enterprise security, streamline authentication processes, account setups, and fast-track your journey towards a secure, passwordless future.Read moreenterprise securitypasswordlessYubiKey 5.7
    • Unlocking the future: Navigating passkeys to passwordless security at scale webinar cover imageUnlocking the future: Navigating passkeys to passwordless security at scaleJoin this webinar to learn about the benefits of passkeys in the landscape of passwordless options, life cycle considerations for achieving a successful passwordless rollout at scale and the latest enterprise-centric updates for YubiKeys.Read morepasskeyspasswordlessphishing-resistant MFAYubiKey
    • Accelerating financial services from legacy MFA to modern passkey authentication cover imageAccelerating financial services from legacy MFA to modern passkey authenticationWatch this webinar to learn the pros and cons of different types of passkey approaches financial services institutions should consider in their move away from legacy authentication.Read morefinancial servicespasskeyspasswordlessphishing-resistant MFA
    • Meeting the Sept 2024 White House phishing-resistant MFA deadline webinar cover imageMeeting the Sept 2024 White House phishing-resistant MFA deadlineLearn best practices from government executives on their agencies’ journeys, how they navigated challenges and pitfalls to achieve compliance and what steps your agency can take right now to show intent and progress toward phishing-resistant MFA.Read morecompliancefederal governmentphishing-resistant MFA
    • How to get started with phishing-resistant MFA to secure federal systems integratorsExplore best practices for implementing phishing-resistant multi-factor authentication (MFA) tailored for Federal Systems Integrators (FSIs) to enhance security against sophisticated cyber threats.Read morefederal systems integratorsMFAphishing-resistant authentication
    • Securing Federal Systems Integrators solution brief cover imageSecuring Federal Systems Integrators with modern authenticationLearn how Federal Systems Integrators (FSIs) can modernize their authentication stack and create phishing-resistant users and systems to protect against modern cyber threats.Read morecybersecurityfederal governmentphishing-resistant MFA
    • Transform Zero Trust featured imageCISOs: Transform Zero Trust to an organization-wide priorityLearn why every CISO’s Zero Trust strategy should start with phishing-resistant MFA.Read moreCISOphishing-resistant MFAYubiKeyzero trust
    • What is FIDO and why is it important for business security? cover imageWhat is FIDO and why is it important for business security?Learn what FIDO is, how it works, and how your organization can benefit from deploying FIDO-based authentication across critical business scenarios.Read moreFIDOMFApasswordlessstrong authentication
    • Securing critical infrastructure webinar featured image of a water damBest practices to secure critical infrastructure with phishing-resistant MFALearn about the need for adopting phishing-resistant MFA to secure critical infrastructure and deployment best practices gathered from numerous global deployments across variety of sectors. Read morebest practicescritical infrastructuredeploymentphishing-resistant MFA
    • Champion PCI DSS 4.0.1 with the YubiKey solution brief cover imageChampion PCI DSS 4.0.1 with the YubiKeyLearn what PCI DSS 4.0.1 means for your authentication strategy and how phishing-resistant MFA using the YubiKey bolsters your compliance posture to meet the needs of today and into the future.Read morePCI DSSphishing-resistant MFAYubiKey
    • Enhancing Federal CybersecurityExplore our infographic on YubiKey’s phishing-resistant multi-factor authentication (MFA) solutions tailored for the federal government. Read morefederal governmentmodern authenticationmodern cyber threats
    • CFOs: Lower cyber insurance premiums with phishing-resistant MFADiscover how CFOs can strengthen cybersecurity and significantly lower cyber insurance costs with Yubico’s phishing-resistant MFA.Read morecyber insurancecybersecurityphishing-resistant authentication
    • CEOs: Critical infrastructure starts with you infographic cover imageCEOs: Secure critical infrastructure starts with youLearn why every CEO’s business continuity strategy should start with phishing-resistant MFA.Read moreC-Suitecritical infrastructurephishing-resistant MFA
    • Securing critical infrastructure white paper cover imageSecuring the world’s critical infrastructure against modern cyber threatsLearn how to safeguard IT/OT systems and the supply chain with Zero Trust using phishing-resistant MFA and hardware-backed security. Read morecritical infrastructurephishing-resistant MFAzero trust
    • pharmaceuticals best practices guide featured imageHow to get started with phishing-resistant MFA to secure pharmaceuticalsLearn the six deployment best practices that can help the pharmaceutical industry accelerate adoption of modern, phishing-resistant MFA at scale using the YubiKey.Read morebest practices guidePharmaphishing-resistant MFAYubiKey
    • YubiKey and Microsoft laptop authenticationYubico|Microsoft: On-the-go enterprise authentication, at speed and scaleLearn more about the current cybersecurity landscape and how collaborations like the one between Yubico and Microsoft play a crucial role in driving the adoption of standards and technologies that raise the bar for enterprise security.Read morecybersecurityenterprise authenticationMicrosoftYubiKey
    • financial services infographicKeeping financial services organizations ahead of modern cyber threatsLearn more about stopping account takeovers and ensuring business continuity with modern phishing-resistant authentication for financial services organizations.Read moreaccount takeoversfinancial servicesphishing-resistant MFAYubiKey
    • mobile payment systemHow to bolster your authentication strategy for PCI DSS 4.0Learn about what this new standard means for you and how not all forms of multi-factor authentication (MFA) are created equal in terms of compliance and mitigating cyber risk.Read morecomplianceMFAPCI DSS
    • YubiKey Deployment solution briefProfessional Services Deployment Best Practices WorkshopA targeted workshop which provides guidance, operational tips and best practices to help clients successfully deploy YubiKeys in their organization.Read morebest practices guidephishing-resistant MFAprofessional servicesYubiKey
    • YubiHSM Bundles solution briefProfessional Services YubiHSM Hours BundleExpert on-demand Professional Services hours providing technical assistance in implementing and managing YubiHSMs in client environments.Read morecybersecurityphishing-resistant MFAprofessional servicesYubiHSM
    • YubiHSM Workshops solution briefProfessional Services YubiHSM Quick Start WorkshopA fast track workshop providing expert technical guidance, tips and best practices on integrating and managing YubiHSMs into client environments.Read morebest practices guidephishing-resistant MFAprofessional servicesYubiHSM
    • How to get started with phishing-resistant MFA to secure telecommunicationsLearn deployment best practices to accelerate adoption at scale and secure your organization from account takeovers for telecommunications.Read morephishing-resistant MFATelecommunicationYubico
    • DOD webinar imageSecuring Department of Defense in 2024 with phishing-resistant MFAWatch this webinar to learn more about how Federal policy makers are increasingly focusing on phishing-resistant MFA.Read morepasswordlessphishing-resistant authenticationzero trust
    • air force jet flyingModern authentication for the Department of the Air ForceDownload the free brochure to learn how the YubiKey solves U.S. Air and Space Force modernization uses cases.Read moregovernmentphishing-resistant MFAYubiKey
    • Securing Your Organization featured imageSecuring Your Organization with YubiKeys at Scale – Unleashing the Advantage & Managing the Challenges with Intercede MyIDJoin this webinar for an in-depth session as we navigate the YubiKey journey, equipping you with the knowledge and tools to elevate your organization’s rollout strategy with confidence.Read morebest practicesphishing-resistant MFAYubiKey
    • state and local best practices featured imageState and local government best practices guideLearn the six deployment best practices that can help your agency accelerate adoption of modern, phishing-resistant MFA at scale.Read morebest practices guidephishing-resistant MFAstate and local governmentYubiKey
    • passkey ebookBuilding a phishing-resistant enterprise with device-bound passkeysBuilding an enterprise that stops account takeovers with phishing-resistant MFA using a device-bound passkey strategy.Read moreaccount takeoverspasskeyspasswordlessphishing-resistant MFA
    • protect manufacturers from modern cyber threats cover imageProtect manufacturers from modern cyber threatsManufacturers of all kinds are being targeted by ransomware and phishing at an alarming rate. They need modern MFA that protects existing infrastructure while enabling the move to stronger phishing-resistant methods. Learn how Yubico can help safeguard your production and profits with phishing-resistant MFA and hardware-backed security.Read moremanufacturersphishing-resistant MFAYubiHSMYubiKey
    • CJIS solution brief featured imageSecuring Department of Corrections with modern, phishing-resistant MFALearn how the YubiKey stops modern cyber threats such as phishing attacks and account takeovers across the Department of Corrections, with CJIS compliant phishing-resistant multi-factor and passwordless authentication.Read moregovernmentpasswordlessphishing-resistant MFAYubiKey
    • Naval ship in waterModern authentication for the modern naval war fighterDownload the free brochure to learn how the YubiKey solves U.S. Navy modernization uses cases.Read moreCACFIPS 140-2modern authentication
    • healthcare best practice guide previewHow to get started with phishing-resistant MFA to secure healthcareDownload the healthcare best practices guide to learn six deployment best practices to accelerate adoption at scale.Read morebest practices guidehealthcare
    • AWS best practice guide previewSecure your AWS environment with highest-assurance phishing-resistant MFADownload the best practice guide to learn more how you can stop account takeovers and go passwordless for a wide variety of AWS use casesRead moreAWSpasswordlessphishing-resistant MFA
    • Enterprise passkey implementations: Key considerations and tradeoffsJoin this webinar to learn more about the different types of passkey implementations and gain an understanding of real life enterprise scenarios.Read moreEnterprisepasskey
    • financial services solution brief previewSecuring financial services with modern, phishing-resistant MFALearn how the YubiKey helps financial organizations drive high security against modern cyber threats and high user productivity with the best user experience.Read morefinancial servicespasswordlessphishing-resistant MFA
    • secure remote workersSecuring remote workers with phishing-resistant MFALearn why legacy authentication such as usernames and passwords, and mobile-based authenticators don’t protect remote workers against phishing attacks and account takeovers, and how the YubiKey ensures phishing-resistant multi-factor and passwordless authentication for critical remote work authentication business scenarios.Read morephishing-resistant MFAremote and hybrid workersYubiKey
    • yubikey resource guide for enterprises featured imageCyber hygiene: Enterprise resource guide for getting started with your YubiKeyThe YubiKey works with hundreds of applications and services, making strong security across multiple accounts simple and effective.  Yubico is giving you a jumpstart on your multi-factor authentication journey by providing an enterprise resource guide to help you get your YubiKey up and running to protect applications and services within your organization. Download our ‘Enterprise […]Read morecybersecurityEnterprisesecurity
    • okta fastpass vs yubikey featured imageOkta and Yubico: Delivering phishing-resistant MFA and a bridge to passwordlessLearn how YubiKeys and Okta FastPass work together to provide the strongest levels of identity assurance against phishing while delivering a fast and easy user experience.Read moreOktapasswordlessphishing-resistant MFAYubiKey
    • microsoft bp guideHow to get started with phishing-resistant MFA for your Microsoft environmentLearn about the six key best practices to accelerate the adoption of phishing-resistant MFA and how to ensure secure Microsoft environments.Read morebest practices guideMicrosoftphishing-resistant MFA
    • featured imageSecure your AWS environment phishing-resistant MFAExplore the YubiKey by Yubico for secure AWS authentication: phishing-resistant, multi-protocol support, and easy integration.Read moreAWSMFAphishing-resistant authentication
    • AWS best practice guide previewAWS Best practices guideDownload this Best Practices Guide to learn about six deployment best practices to accelerate your adoption of phishing-resistant MFA for your AWS environment at scale.Read moreAWSbest practices guidephishing-resistant MFA
    • dodModernizing authentication across the Department of Defense with phishing-resistant MFALearn how the DOD-approved and FIPS 140-2 validated YubiKey is helping the federal government with phishing-resistant multi-factor authentication (MFA) for modern use cases not supported by the PIV and CACRead moregovernmentmodern authenticationphishing-resistant authentication
    • EMA transcending passowrdless webinar featured imageTranscending Passwords: Emerging Trends in AuthenticationWatch this webinar to learn more about the business impact and trends of authentication practices, with consequences for security, productivity and employee retention.Read morepasswordlessphishing-resistant MFAstrong authentication
    • device-bound passkeys featured imageHow to get started with passwordless using device-bound passkeys Read the Yubico deployment best practices guide to get started with device-bound passkeys for your passwordless authentication journey.Read morebest practices guidepasskeyspasswordlessYubiKey
    • microsoft datasheet featured imageGo Passwordless with Windows Hello for Business and YubiKeysLearn how Windows Hello for Business and YubiKeys work in concert to provide solutions for your organization and your customers.Read moreMicrosoftpasswordlessphishing-resistant MFAYubiKey
    • Secure you Microsoft environment featured imageSafeguard your Microsoft ecosystem with a Zero Trust strategyLearn why there is a critical need for phishing-resistant MFA to support Zero Trust for Microsoft environments.Read moreMicrosoftphishing-resistant MFAYubiKeyzero trust
    • Yubico company brochure previewMaking the internet safer with modern authenticationLearn more about how Yubico helps secure global enterprises, SMBs, and individuals with modern phishing-resistant multi-factor authentication (MFA) and passwordless. Elevate your cyber resilience and accelerate your zero trust strategy with modern authentication that stops phishing attacks and account takeovers before they start. Read moremodern authenticationphishing-resistant MFAYubiKey
    • ema report passwordless feautured imageTranscending Passwords: The Next Generation of AuthenticationThe report exposes the business impact of authentication practices, with consequences for security, productivity and employee retention.Read moreauthenticationcybersecuritypasswordless
    • EMA passwordless infographic featured imageTranscending passwords: Emerging trends in authenticationEnterprises that eliminate passwords report better business and security outcomes. New research finds organizations using passwordless technologies experience the fewest phishing attacks, are more productive and achieve greater levels of employee satisfaction.Read moreauthenticationpasswordless
    • Yubico and Okta ebook coverYubico and Okta: Raising the bar for securityDownload the Yubico and Okta eBook to learn the importance of a strong security posture and actions you can take today to secure your organization’s future.Read morecybersecurityOktaphishing-resistant MFA
    • secure retailers and hoteliers featured imageSecure retailers and hoteliersEmbrace a customer-centric security solution with phishing-resistant MFA that champions security and usability.Read morecybersecurityphishing-resistant MFAretail and hospitality
    • YubiKey in laptopFast, Out-of-the-Box FIDO Activation with Yubico and OktaLearn more about the approach of “Accelerating Phishing-Resistant MFA and Passwordless with Fast, Out-of-the-Box FIDO Activation with Okta.” Read moreOktaphishing-resistant MFAYubiKey
    • YubiKeys as a giftHoliday shopping is underway: are you protecting yourself online?Join this webinar, and hear from our security experts to better understand the current cyber threat landscape, and learn best practices to stay secure online through the holiday season and beyond.Read morecybersecurityHoliday
    • Passkey screenMany roads to passwordless: How passkeys fit in the modern landscapePasskeys are the long awaited replacement for passwords. Come learn how passkeys help accelerate widespread adoption of passwordless authentication for consumers and organizations.Read morepasskeyspasswordless
    • featured image, two workers looking at tabletProtecting Federal Systems IntegratorsLearn how phishing-resistant MFA can help federal systems integrators stop phishing attacks and account takeovers with phishing-resistant MFARead moreaccount takeoversphishing-resistant MFAransomware
    • manufacturing user stories brochure feature page imageManufacturers across the globe are investing in modern authenticationSee real stories of how global manufacturers and other leading brands changed the game for modern enterprise authentication security.Read morecybersecuritymanufacturingsupply chainYubiKey
    • Yubico | HYPR solution brief coverYubico and HYPRLearn how Yubico and HYPR provide a seamless passwordless authentication experience that meets your security needs.Read moreHYPRpasswordless
    • energy and natural resources best practice guide feature imageEnergy and Natural Resources Deployment Best Practices GuideLearn the six deployment best practices that can help accelerate the adoption of modern, phishing-resistant MFA at scale using the YubiKey.Read morebest practices guideenergy and natural resourcesYubiKey
    • The dark side of mobile authenticationModern cyber threats are increasing in scale so ensuring strong security for access to enterprise applications and services is a critical need across all industries. Join this webinar to learn the top 5 mobile authentication misconceptions and much more! Read moremobile authenticationphishing-resistant MFA
    • retail and hospitality best practices guide coverRetail and Hospitality Deployment Best Practices GuideLearn deployment best practices for retail and hospitality to accelerate adoption of phishing-resistant MFA at scale using the YubiKey.Read morebest practices guidephishing-resistant MFAretail and hospitality
    • user on mobile deviceThe dark side of your mobile authentication strategyLearn the key misconceptions related to mobile-based MFA that are putting your organization at risk of being hacked. Read moremobile authenticationphishing-resistant MFA
    • Not all MFA is created equal ebookExplore advanced MFA methods and boost online security with Yubico’s expert insights. Download now for essential digital protection.Read moreMFAphishing-resistant authentication
    • phishing-resistant best practice guide coverHow to get started with modern, phishing-resistant MFALearn the six deployment best practices that can help your organization accelerate the adoption of modern, phishing-resistant MFA at scale using YubiKeys.Read moremodern authenticationphishing-resistant MFA
    • Cyber insurance strategyCyber attacks are getting more sophisticated, and expensive, leading to higher cyber insurance premiums. Phishing-resistant MFA can help set you up for success and save on costs.Read morecyber insurancephishingphishing-resistant MFA
    • Securing Critical InfrastructureDiscover how phishing-resistant MFA shields global critical infrastructure. Yubico’s infographic reveals key stats and modern defense strategies.Read morecritical infrastructurecybersecurityphishing-resistant MFA
    • Demystifying modern, phishing-resistant MFA and deployment approachesEnsuring strong security for access to enterprise apps and services is an urgent need across all industries to protect against modern cyber threats. Join this webinar to learn deployment best practices to adopt phishing-resistant MFA and speed and scale.Read moredeploymentphishing-resistant MFA
    • Yubico and Microsoft data sheet featured imageMicrosoft top 5 use casesExplore how Yubico and Microsoft are revolutionizing Zero Trust cybersecurity with phishing-resistant multi-factor authentication solutions.Read moreMicrosoftYubicozero trust
    • Passkey get started previewPasskeys for your Enterprise? Key considerations for successJoin our webinar to learn about common enterprise scenarios where synced passkeys may create some chilling failure points, and other more effective and secure passkey alternatives that put your business in the best security and compliance posture.Read moreEnterpriseMFApasskey
    • Federal best practices guide previewFederal Government Deployment Best Practices GuideLearn the six deployment best practices that can help your agency accelerate adoption of modern, phishing-resistant MFA at scale using the YubiKey.Read morebest practices guidefederal governmentzero trust
    • Zero Trust survey previewCybersecurity Insiders report: Path to Zero TrustRapid digital transformation, increased remote work, and evolving cybersecurity threats have catapulted Zero Trust from an IT buzzword to a foundational cybersecurity model. In our comprehensive report, “The Path to Zero Trust: Industry Insights and Best Practices”, we delve into the latest adoption trends, challenges, and the current state of Zero Trust, based on a […]Read morecybersecurityzero trust
    • Best Practices Guide: How to get started with phishing-resistant MFA for Zero TrustRead the Yubico deployment best practices guide to learn how to get started with phishing-resistant MFA to meet Zero Trust security requirements.Read moredeploymentphishing-resistant MFAsecurityzero trust
    • Industry week webinar previewSafeguard IT/OT EcosystemsJoin us to hear from thought leaders at Schneider Electric and Yubico as they discuss the role of phishing-resistant authentication and hardware-backed security using Zero Trust principles across your company and supply chain. Read morehardwaresupply chainzero trust
    • YubiKey and Microsoft via mobile devicesPrevent phishing with Azure AD CBA and YubiKeys on mobile devicesIn this webinar, you’ll hear how Yubico is working closely with Microsoft on its CBA mobile solutions to play a critical part in the fight against phishing. The companies are working together to support organizations to provide consistent and strong phishing-resistance across all platformsRead moreAzure ADCBAmobile authenticationphishing-resistant MFA
    • Manufacturing authentication checklist asset previewManufacturing authentication compliance checklistLearn how phishing-resistant MFA can help manufacturers embrace data protection compliance with confidence.Read morecompliancemanufacturingphishing-resistant MFA
    • Phishing-resistant MFA for Manufacturing best practice guide previewBest Practices Guide: How to get started with phishing-resistant MFA to secure manufacturingLearn the six deployment best practices that can help your manufacturing organization accelerate adoption of modern, phishing-resistant MFA and cryptographic protection using Yubico solutions.Read moremanufacturingphishing-resistant MFA
    • Phishing-resistant MFA for financial services best practice guide previewBest Practices Guide: How to get started with phishing-resistant MFA to secure financial servicesLearn the six deployment best practices that can help your organization accelerate adoption of modern, phishing-resistant MFA at scale using the YubiKey.Read morebest practices guidefinancial servicesphishing-resistant MFA
    • Phishing-resistant MFA for financial services white paper previewPhishing-resistant MFA for financial servicesLearn why legacy forms of MFA such as mobile-based authenticators are putting your employees at risk of being hacked, and how the phishing-resistant YubiKey can strengthen your security posture.Read morefinancial servicesmodern authenticationphishing-resistant MFA
    • YubiKey with mobileWhat the Authn? How Passkeys Offer a Fresh Take to Authentication DilemmasJoin our webinar to learn everything you need to know about passkeys and how you can utilize passkey technology to protect your business.Read morepasskey
    • Zero Trust white paper coverAccelerate Your Zero Trust Strategy w/ Strong AuthenticationLearn about strong authentication best practices that will put you on the right track to implementing your Zero Trust framework.Read morestrong authenticationzero trust
    • TEI Forrester reportThe Total Economic Impact™ Of Yubico YubiKeysRead the Forrester Consulting study commissioned by Yubico and see how a composite organization reduced risk by 99.9%, saw a drop in password-related helpdesk tickets by 75%, and experienced a 203% 3-year ROI with YubiKeys.Read moremodern authenticationYubiKey
    • Deployment 360 solution brief previewProfessional Services Deployment 360 ProgramLearn about Yubico’s Deployment 360 program which packages up all of the essential elements needed in getting your organization jump started on deploying YubiKeys. Read moredeploymentprofessional servicesYubiKey
    • cba implementation imageProfessional Services Microsoft Entra ID CBA ImplementationLearn how you can enlist dedicated technical engagement designed to help you implement YubiKeys and MFA with Microsoft Entra ID Hybrid using Certificate-Based Authentication (CBA).Read moreCBAMicrosoft Azureprofessional services
    • Professional Services Deployment Advisors Consultants Read the solution brief to learn more about how Yubico Professional Services now offers dedicated Deployment Advisors to help shepherd you through your YubiKey deployment, from planning  to wrap-up. Read moredeploymentprofessional services
    • entra id quickstart imageProfessional Services Microsoft Entra ID Quick Start WorkshopJoin us for a comprehensive review and technical tips on integrating YubiKeys with Microsoft Azure. In addition, the workshop includes best practices on operational deployment topics plus post-workshop technical consulting hours.Read moreMicrosoft Azureprofessional services
    • preview of solution briefProfessional Services YubiKey Distribution Planning WorkshopsLet us help you plan a comprehensive interactive workshop providing customized support in developing a plan for completing the distribution of YubiKeys across your organization.Read moreprofessional services
    • Considering Passkeys for your Enterprise? Avoid common pitfalls of synced passkeysNavigating the new passkey landscape? Read the ebook to learn about synced passkeys that are copyable versus device-bound passkeys, and how synced passkeys can create some failure points in the enterprise.Read moreEnterprisepasskeypasswordless
    • Need cyber insurance in 2023? Reduce risk and cost with phishing-resistant MFAAttend this webinar to learn how the cyber threat landscape is changing, why modern, phishing-resistant MFA has never been more critical to thwart account takeovers and ransomware attacks and how organizations can make raising the bar for security, simple, affordable and easy, and more easily qualify for cyber insurance.Read moreaccount takeoverscyber insurancephishing-resistant MFA
    • Move over passwords: Now is the time to move to modern, phishing-resistant MFAOnly 46% of respondents protect their enterprise applications with MFA according to a new report. Learn how businesses can protect themselves against growing cyber threats.Read morecyberattackmodernize mfaphishing-resistant MFA
    • Not all MFA is created equal: Mobile MFA lures cybercriminalsLegacy MFA such as mobile authentication is highly vulnerable to phishing and other forms of account takeovers. Learn about the pitfalls of mobile MFA and best practices to stop account takeovers.Read moremobile authenticationphishing-resistant MFA
    • Yubico and S&P Global Market Intelligence Research ReportYubico commissioned a research report conducted by S&P Global Market Intelligence, to survey senior professionals and executives in IT security, compliance, and cyber risk.Read moreauthenticationMFAphishing-resistant MFAsecurity
    • Implications of outdated federal identity strategiesJoin Yubico and our esteemed panel for a roundtable discussion on challenges with current ICAM strategies and what’s needed for the makings of a modern identity strategy to enable digital modernization and cyber risk reduction. Read morefederal governmentmodern authentication
    • woman on mountainCybersecurity and our planet: The role of modern authenticationJoin Yubico and and our esteemed panel as we discuss the role of cybersecurity and how securing user access to critical infrastructure services with modern phishing-resistant authentication is integral in safeguarding the most sensitive information, processes, and systems that our society depends on. Read morecybersecurityEarth Daymodern authentication
    • Why your one time OTP legacy MFA is setting you up for a security breachLearn how phishing-resistant MFA addresses the gaps that legacy MFA creates.Read moreMFAOTPsecurity
    • Yubico and Versasec: The Winning Combination for Implementing Phishing-Resistant MFAYubico and Versasec join forces to provide government agencies and enterprises the winning combination to implement phishing-resistant Multi Factor Authentication (MFA).Read morephishing-resistant MFAYubicoYubiKey
    • Phishing-resistant MFA for Federal GovernmentLearn how you can meet Zero Trust and phishing-resistant MFA per EO 14028 and OMB M-22-09 mandates with the DOD-approved and FIPS 140-2 validated YubiKey.Read moreFIPS 140-2phishing-resistant MFAYubiKeyzero trust
    • Best practices to secure call centers with phishing-resistant MFAJoin Yubico for a roundtable discussion to learn phishing-resistant MFA and deployment best practices for call centers, gathered from numerous global deployments across critical industries such as financial services, healthcare, hospitality, retail, technology and others. Read morecall centerphishing-resistant MFAYubico
    • Accelerate your MFA and YubiKey deployment with Yubico Professional ServicesWatch this webinar to learn more about deployment tips and best practices, the value of Yubico Professional Services, and new offerings available.Read moreMFAprofessional servicesYubiKey
    • YubiKeys as a Service enable faster and wider rollouts of modern MFA in 2023Watch this webinar to learn about how to procure YubiKeys as a Service with the new and expanded YubiEnterprise Subscription offering for greater business agility and predictability.Read moreMFAmodernize mfaYubiKey
    • call center white paperSecuring call centers with phishing-resistant MFARead the white paper to learn how to secure your call center environments against phishing and account takeovers using the phishing-resistant YubiKeyRead morecall centermodern authenticationphishing-resistant MFA
    • Global Enterprise survey report - UKState of Global Enterprise Authentication Survey: UKThe Yubico State of Global Enterprise Authentication Survey asked employees, including in the UK, how modern enterprises embrace phishing-resistant MFA.Read moreauthenticationEnterpriseMFAYubico
    • Global Enterprise survey report - SingaporeState of Global Enterprise Authentication Survey: SingaporeThe Yubico State of Global Enterprise Authentication Survey asked employees, including in Singapore, how modern enterprises embrace phishing-resistant MFA.Read moreauthenticationEnterpriseMFAYubico
    • Global Enterprise survey report - AUS+NZState of Global Enterprise Authentication Survey: including exclusive data from Australia & New ZealandThe Yubico State of Global Enterprise Authentication Survey asked employees, including in Australia and New Zealand, how enterprises embrace phishing-resistant MFA.Read moreauthenticationEnterpriseMFAYubico
    • Phishing resistant MFA for state and local governmentDownload the Yubico White Paper, Modernize authentication across state, local, tribal and territorial governments, to learn authentication best practices on how to achieve 100% MFA coverage, ensure zero account takeovers and meet your cyber insurance MFA requirements.Read moreaccount takeoversMFAstate and local government
    • passkey featured imageInfographic: Everything you need to know about passkeysWhy are passkeys so phishing-resistant? What’s the difference between a synced passkey and a hardware passkey? Passkeys done right: Top 5 TakeawaysRead more
    • call center solution briefHow to best secure your call center environments with against modern cyber threatsLearn key considerations in choosing the right authentication solution for call centers.Read morecall centermodern cyber threatsphishing-resistant MFAshared workstation
    • Yubico solution briefFive ways Yubico can help you accelerate and scale phishing-resistant MFA in 2023Learn about the 5 ways Yubico can help you accelerate and scale phishing-resistant MFA, starting now through 2023, to stop phishing, ransomware and other forms of account takeovers in their tracks.Read moreenterprise securitymodern authenticationphishing-resistant MFA
    • telecommunications workerSecuring telecommunications against modern cyber threatsRead the white paper to learn how phishing-resistant MFA protects telecommunication organizations from modern cyber threats and prevents account takeovers with an easy to use experience that removes roadblocks that legacy forms of authentication such as passwords, mobile-based MFA provides. Read moremodern cyber threatsphishing-resistant MFATelecommunication
    • State Global Enterprise Authentication SurveyThe Yubico State of Global Enterprise Authentication Survey asked 16,000 employees in 8 countries how modern enterprises are embracing phishing-resistant MFA.Read moreauthenticationEnterpriseMFAYubico
    • phishing resistance MFAWidespread SMS phishing attack thwarted with Cloudflare Zero Trust and YubiKeysLearn how physical security keys played a crucial role in not allowing Cloudflare to be another victim in a widespread phishing attack.Read morephishing-resistant MFAstrong MFAzero trust
    • Devising Your Authentication Strategy: Passkey Implementations and TradeoffsJoin this webinar to learn the benefits and challenges of different forms of passkeys and what to look for in a passkey solution. Read moremodern authenticationpasskeystrong MFA
    • Devising Your Enterprise Authentication Strategy with PasskeyRead the ESG Showcase for guidance on the benefits and challenges of different forms of passkeys and discuss what to look for in a passkey solution.Read moreauthenticationpasskeypasswordless
    • mobile and cloud servicesPasskey Guidance for Web and Mobile AppsLearn what passkeys are, their benefits, deployment considerations, and how to implement WebAuthn passkey best practices.Read moremobile authenticationpasskeyWebAuthn
    • MSFT and YubiKeysNew tools to prevent phishing with Azure AD and YubiKeysLearn how these new features combined with a YubiKey should be an integral part of your Zero Trust strategy.Read moreAzure ADCBAMicrosoftzero trust
    • The Rise of Low-Friction Access: Emerging Requirements and Solutions for Boosting Workforce Productivity and Security AssuranceTo provide businesses with actionable guidance to streamline authentication processes, Yubico commissioned a study with Enterprise Management Associates (EMA) to identify current requirements, challenges, and solutions in relation to mitigating access friction.Read moreauthenticationmodernize mfastrong MFA
    • Protecting the healthcare ecosystem with phishing-resistant MFALearn how the YubiKey helps healthcare organizations across insurance, providers, clinicians, biotech, and pharmaceuticals drive high security against modern cyber threats and high user productivity with the best user experienceRead morehealthcarepasswordlessphishing-resistant MFAYubiKey
    • Achieve 100% MFA across state and local governmentLearn how state and local governments can ensure 100% MFA coverage to protect against modern cyber threats and meet cyber insurance requirements with the YubiKey.Read morecyber insurancephishing-resistant MFAstate and local governmentstrong authentication
    • featured cyber securityMeeting enhanced cyber insurance requirements with strong authenticationCyber risk is becoming an ever-greater business liability, with 40% of business leaders reporting cyber threats as the No. 1 business risk. As a result, organizations have increasingly turned to cyber insurance to help them recover from damage or minimize impact. Read this whitepaper to learn about the changing cyber threat and cyber insurance landscape, and the best way to position your organization to qualify more easily for cyber insurance.Read morecyber insurancecybersecurityphishing-resistant MFAstrong authentication
    • The importance of hybrid authentication in zero trust architecturesCome learn key differences between PKI and FIDO, how to deploy FIDO within federal security policies, how to deploy FIDO within federal security policies, and more.Read morefederal governmentFIDOOMB Memo-22-09zero trust
    • updated featured image okta eo solution briefOkta EO Ping Identity | EO 14028 compliance – YubicoLearn how you can achieve federal compliance with YubiKeys and Okta.Read more
    • Microsoft and Yubico solution briefMicrosoft  | Yubico Phishing-resistant MFA for TelecomsLearn how you can achieve modern security with Microsoft Azure AD and  YubiKey to bolster cyber security.Read moreMicrosoftphishing-resistant MFATelecoms
    • Zero Trust with phishing-resistant MFA is mission-criticalJoin Yubico and Okta on September 22nd to learn how YubiKey, combined with Okta Adaptive MFA, work together to provide modern phishing-resistant MFA as well as a simplified user experience for the strongest levels of protection.Read moremodern authenticationOktaphishing-resistant MFAzero trust
    • FinServ ComplianceHow PCI DSS 4.0 and CFPB Circular 2022-04 are re-shaping authentication across financial servicesThe recent PCI DSS 4.0 and Consumer Financial Protection Circular 2022-24 setting guidelines for phishing-resistant multi-factor authentication (MFA) for user access to critical systems and customer-facing digital services have set the stage to change how financial services organizations should be thinking about their security investments not just for today but for future regulatory changes.Read moreauthenticationcompliancefinancial services
    • YubiKey as a Service: YubiEnterprise SubscriptionAttend this webinar to learn about the latest in the cyberthreat landscape, the critical need for phishing-resistant MFA and how organizations can introduce agility, flexibility and peace of mind with a hardware authentication as a service model. Read morephishing-resistant MFAYubiEnterprise Subscription
    • retail and hospitality wpProtecting retail and hospitality against cyber threatsLearn how modernizing authentication can secure shared devices, protect sensitive data, and prevent account takeovers while enhancing customer experience. Read morecybersecuritymodern authenticationphishing-resistant MFAretail and hospitalityYubiKey
    • Phishing-Resistant MFA fact vs fictionPhishing-resistant multi-factor authentication (MFA) is a critical call to action per the White House Executive Order 14028 on Protecting the nation’s cybersecurity, and Office of Management and Budget Memo M-22-09Read moreauthenticationMFAphishing-resistant MFA
    • healthcare white paper with workersModernizing MFA and going passwordless in healthcare – YubicoRead the white paper to learn how to protect against phishing and ransomware across the healthcare sector using YubiKeys for phishing-resistant MFA and passwordless authenticationRead morehealthcaremodern authenticationpasswordless
    • The Total Economic Impact Of Yubico YubiKeysAttend this webinar to learn about the latest in: – The evolving cyberthreat and compliance landscape – How to procure YubiKeys as a Service for greater business agility and predictability – The findings from the Forrester Total Economic Impact (TEI) report that showcases YubiKeys delivering 203% Return on Investment (ROI)Read moreenterprise securityYubiEnterpriseYubiEnterprise DeliveryYubiEnterprise Subscription
    • Ping Identity | EO 14028 compliance – YubicoLearn how YubiKey and Ping Identity together offer phishing-resistant MFA to protect against account takeovers within government agenciesRead morecomplianceExecutive Orderphishing-resistant MFAPing Identity
    • WebAuthn Explained: Advancing Authentication with Hardware Security Keys & Establishing a Root of Trust – Yubico InsightsEstablishing a “root of trust” is the mechanism in which a user recovers an account or establishes their identity on a new deviceRead moreroot of trustWebAuthn
    • One northeastern U.S. state secured elections using MFAElection security is an increasing concern. One Northeastern state adopted mfa using hardware security keys to protect its votersRead moreelections and political campaignsgovernmentMFAphishing-resistant MFAstate and local government
    • supply chain imageProtecting the supply chain with modern security Learn how Yubico solutions such as the YubiKey and YubiHSM 2 can help you secure your software supply chain, ensure IP security and product integrity, and provide highest-assurance security for third party access to critical systems and data.Read moremodern authenticationphishing-resistant MFAsupply chain
    • shared workstationsA cybersecurity roadmap for securing shared workstationsLearn critical authentication requirements for shared workstations and devices, and best practices to ensure your organization stays protected against modern threats.Read morecybersecuritymodern authenticationshared workstation
    • woman working at computerBest practices for securing mobile-restricted environments with MFAAttend this webinar to learn the key security best practices to secure mobile-restricted environments.Read moremobile-restrictedmodern authenticationphishing-resistant MFA
    • energy white paper imageSecuring energy and natural resources against modern cyber threatsLearn the critical need for phishing-resistant multi-factor authentication to safeguard this critical infrastructure and authentication best practices to close the critical threat gap that emerges from legacy authentication.Read moreenergy and natural resourcesmodern authenticationoil and gasphishing-resistant MFA
    • venable white paperHow governments and higher education can achieve 100% MFALearn how state and local governments and higher education can drive 100 percent MFA coverage to protect against phishing and account takeoversRead moreeducationphishing-resistant MFAstate and local government
    • energy workersModernizing authentication across energy and natural resource organizationsLearn best practices to modernize cybersecurity across your critical IT and OT environments with Yubico solutions, to stop modern cyber threats and drive cyber insurance hygiene.Read morecybersecurityenergy and natural resourcesmodern authentication
    • MSFT + YubiKey for EOStrong phishing resistant MFA for EO complianceLearn how you can achieve federal compliance with YubiKeys and MicrosoftRead moreExecutive OrderMicrosoftphishing-resistant MFA
    • Telcoms solution brief imagePhishing-resistant MFA for TelecomsLearn how the YubiKey can bolster existing security approaches by providing a future-proof layer of protection to safeguard people, technology, and data. Read moremodern authenticationphishing-resistant MFATelecommunicationTelecoms
    • Passkeys and YubiKey FAQPasskeys and the future of modern authentication: Q&A with Yubico’s CTOLearn the role passkeys play in modern authentication and some of the most common misconceptions.Read moremodern authenticationpasskeyphishing-resistant MFA
    • aws marketplace and YubiKey solution briefAWS Marketplace Yubico Partner BriefLearn how YubiKeys work to secure your AWS services and resources. Read moreAWSphishing-resistant MFA
    • Graduating from legacy MFA to modern authenticationDownload the Yubico White Paper, Graduating from legacy MFA to modern authentication: The critical need for increased security across education, to learn authentication best practices in modernizing authentication to stop modern day cyber threats.Read moreauthenticationeducationMFA
    • YubiKey 5C NFCDemystifying phishing-resistant MFA: Fact versus fictionJoin to understand the different types of MFA in the market and whether they are truly phishing-resistant or not.Read moremodern authenticationphishing-resistant MFA
    • Protecting the supply chain with highest-assurance securityDownload the Yubico White Paper, Protecting the supply chain with highest-assurance security: Go passwordless, ensure product integrity, and protect the software supply chain, to learn authentication best practices in securing supply chain integrity.Read moreMFAsupply chain
    • Modernizing authentication across educationLearn how you can modernize cybersecurity across the education sector with the easy-to-use, affordable YubiKey, to stop modern threats and drive cyber insurance hygiene.Read moreeducationmodern authenticationphishing-resistant MFA
    • Smart Cards Simplified – Private sectorSmartcards provide strong security but they can be complex for to adopt both for the organization and the end users alike. Users may even have to carry smart card readers and additional peripherals to use the solution. Read this solution to understand how a modern and simplified smart card approach can either replace your legacy smart card approach, or get you on the road to raising the security bar, by providing strong phishing defense in the modern cyber threat landscape. All while being very well suited for your hybrid or remote workforce, with users working across a range of modern desktops, tablets and smart phones.Read moresmart cardstate and local governmentstrong authentication
    • The future of Federal cybersecurity is hereSmart cards, while they provide strong security, can be complex for to adopt both for the organization and the end users alike. Users may even have to carry smart card readers and additional peripherals to use the solution. Read this solution to understand how a modern and simplified smart card approach can augment your existing smart card strategy and provide strong phishing defense in the modern cyber threat landscape. All while being very well suited for your hybrid or remote workforce, with users working across a range of modern desktops, tablets and smart phones.Read morecybersecurityExecutive Ordersmart card
    • YubiKey plugged inside laptopNew Cyber Insurance Requirements: Critical need for Phishing-Resistant MFACome learn new cyber insurance requirements and ways to adopt true phishing-resistant MFA that keeps your business and users protected. Read morecyber insurancemodern authenticationphishing-resistant MFA
    • Accelerate YubiKey adoption at scaleLearn deployment best practices to enhance your security posture with phishing-resistant MFARead moreauthenticationphishing-resistant MFAsecurity
    • Securing federal government with phishing-resistant MFAJoin to hear from government executives on how they are planning for OMB M-22-09, to ensure the highest protection for mobile, cloud platforms and systems that don’t support PIV and CACRead moreExecutive Orderfederal governmentphishing-resistant MFA