Skip to content
English
Français
Deutsch
日本語
Español
Svenska
Contact Sales
Resellers
Support
About
Products
Enterprise
Resources
Solutions
0
All YubiKeys
Compare YubiKeys
What is a YubiKey?
Set up your YubiKey
YubiKey 5 Series
Learn More
Buy
YubiKey 5 FIPS Series
Learn more
Buy
YubiKey Bio Series
Learn more
Buy
Security Key Series
Learn more
Buy
YubiHSM 2 & YubiHSM 2 FIPS
Learn more
Buy
Accessories
Learn more
Buy
Resources
Browse our library of white papers, webinars, case studies, product briefs, and more.
Home
»
Resources
»
Resource library
All Categories
Product briefs
Solution briefs
Webinars
White papers and reports
Filter
AI
APIs
AWS
Active Directory
Axiad
Azure AD
C-Suite
CAC
CBA
CISO
CJIS
Centrify
DORA
Device-bound passkeys
Duo security
Earth Day
Enterprise
Executive Order
FIDO
FIDO U2F security key
FIDO2
FIPS 140-2
Google
HYPR
Holiday
Java
MFA
MFA mandates
Microsoft
Microsoft 365
Microsoft Azure
OMB Memo-22-09
OTP
Okta
PCI DSS
PIV
Pharma
Ping Identity
Public Sector
RSA
Report
Telecommunication
Telecoms
WebAuthn
Works with YubiKey
YubiEnterprise
YubiEnterprise Delivery
YubiEnterprise Subscription
YubiHSM
YubiHSM 2
YubiKey
YubiKey 5
YubiKey 5.7
YubiKey 5ci
YubiKey Bio
YubiKey FIPS Series
YubiKey as a Service
YubiKeys
Yubico
Yubico FIDO Pre-reg
account takeovers
authentication
banking
best practices
best practices guide
biometrics
call center
compliance
covid-19
critical infrastructure
cryptography
cyber insurance
cyber resilience
cyberattack
cybersecurity
deployment
digital transformation
education
elections and political campaigns
energy
energy and natural resources
enterprise authentication
enterprise security
federal government
federal systems integrators
financial services
getting started
government
hardware
healthcare
high-tech
identity and access management
insurance
manufacturers
manufacturing
mobile authentication
mobile-restricted
modern authentication
modern cyber threats
modernize mfa
multifactor authentication
nis2
oil and gas
passkey
passkeys
passwordless
phishing
phishing-resistant MFA
phishing-resistant authentication
phishing-resistant users
privileged users
professional services
ransomware
regulation
remote and hybrid workers
remote workers
retail and hospitality
root of trust
securing critical infrastructure
security
security key
shared workstation
shared workstations
smart card
smb
state and local government
stop account takeovers
strong MFA
strong authentication
subscription
supply chain
user authentication
work-from-home
wwyk
yubico services
zero trust
Build robust cybersecurity postures with cyber insurance & modern authentication
Brent Deterding, CISO, Afni and Davis Hake, Co-founder, Insurtech, discuss the current cybersecurity and cyber insurance landscape and how leaders of today and tomorrow should be planning for the new age of cyber offense without breaking the bank.
Read more
CFOs: Lower cyber insurance premiums with phishing-resistant MFA
Discover how CFOs can strengthen cybersecurity and significantly lower cyber insurance costs with Yubico’s phishing-resistant MFA.
Read more
CEOs: Secure critical infrastructure starts with you
Learn why every CEO’s business continuity strategy should start with phishing-resistant MFA.
Read more
Cyber insurance strategy
Cyber attacks are getting more sophisticated, and expensive, leading to higher cyber insurance premiums. Phishing-resistant MFA can help set you up for success and save on costs.
Read more
Need cyber insurance in 2023? Reduce risk and cost with phishing-resistant MFA
Attend this webinar to learn how the cyber threat landscape is changing, why modern, phishing-resistant MFA has never been more critical to thwart account takeovers and ransomware attacks and how organizations can make raising the bar for security, simple, affordable and easy, and more easily qualify for cyber insurance.
Read more
Achieve 100% MFA across state and local government
Learn how state and local governments can ensure 100% MFA coverage to protect against modern cyber threats and meet cyber insurance requirements with the YubiKey.
Read more
Meeting enhanced cyber insurance requirements with strong authentication
Cyber risk is becoming an ever-greater business liability, with 40% of business leaders reporting cyber threats as the No. 1 business risk. As a result, organizations have increasingly turned to cyber insurance to help them recover from damage or minimize impact. Read this whitepaper to learn about the changing cyber threat and cyber insurance landscape, and the best way to position your organization to qualify more easily for cyber insurance.
Read more
New Cyber Insurance Requirements: Critical need for Phishing-Resistant MFA
Come learn new cyber insurance requirements and ways to adopt true phishing-resistant MFA that keeps your business and users protected.
Read more
Cyber insurance requirements raise the security bar
The cyberthreat landscape has always been worrisome, but recent news reports show a sharp growth in highly sophisticated cyber attacks of various kinds, from nation states and other bad actors. Ransomware attacks and other forms of account compromise continue to grace the news every month costing companies billions in downtime and lost opportunity. And in keeping with frequent and large payouts, cyber insurance companies have raised premiums by as much as 150-300%, and requiring organizations looking to purchase cyber insurance coverage to raise their bar for security. Read this solution brief to learn about the changing landscape and requirements, and how to protect your business and users with phishing-resistant multi-factor authentication (MFA).
Read more
See More