Skip to content
  • Contact Sales
  • Resellers
  • Support
Yubico Logo
0

All YubiKeys Compare YubiKeys What is a YubiKey? Set up your YubiKey

YubiKey 5 Series

Learn More Buy

YubiKey 5 FIPS Series

Learn more Buy

YubiKey Bio Series

Learn more Buy

Security Key Series

Learn more Buy

YubiHSM 2 & YubiHSM 2 FIPS

Learn more Buy

Accessories

Learn more Buy

  • Resources

    Browse our library of white papers, webinars, case studies, product briefs, and more.
    Home » Resources » Resource library
    • All Categories
    • Product briefs
    • Solution briefs
    • Webinars
    • White papers and reports
    AI APIs AWS Active Directory Axiad Azure AD C-Suite CAC CBA CISO CJIS Centrify DORA Device-bound passkeys Duo security Earth Day Enterprise Executive Order FIDO FIDO U2F security key FIDO2 FIPS 140-2 Google HYPR Holiday Java MFA MFA mandates Microsoft Microsoft 365 Microsoft Azure OMB Memo-22-09 OTP Okta PCI DSS PIV Pharma Ping Identity Public Sector RSA Report Telecommunication Telecoms WebAuthn Works with YubiKey YubiEnterprise YubiEnterprise Delivery YubiEnterprise Subscription YubiHSM YubiHSM 2 YubiKey YubiKey 5 YubiKey 5.7 YubiKey 5ci YubiKey Bio YubiKey FIPS Series YubiKey as a Service YubiKeys Yubico Yubico FIDO Pre-reg account takeovers authentication banking best practices best practices guide biometrics call center compliance covid-19 critical infrastructure cryptography cyber insurance cyber resilience cyberattack cybersecurity deployment digital transformation education elections and political campaigns energy energy and natural resources enterprise authentication enterprise security federal government federal systems integrators financial services getting started government hardware healthcare high-tech identity and access management insurance manufacturers manufacturing mobile authentication mobile-restricted modern authentication modern cyber threats modernize mfa multifactor authentication nis2 oil and gas passkey passkeys passwordless phishing phishing-resistant MFA phishing-resistant authentication phishing-resistant users privileged users professional services ransomware regulation remote and hybrid workers remote workers retail and hospitality root of trust securing critical infrastructure security security key shared workstation shared workstations smart card smb state and local government stop account takeovers strong MFA strong authentication subscription supply chain user authentication work-from-home wwyk yubico services zero trust
    nis2 NIS2 Compliance The NIS2 Directive, effective January 2023, expands the scope of the original NIS Directive to include stricter cybersecurity requirements across more sectors in the EU. It mandates enhanced security measures like incident reporting, multi-factor authentication, and supply chain security, with penalties for non-compliance reaching up to €10M or 2% of annual revenue. Organizations must ensure compliance by October 2024 to avoid significant fines and operational risks. Read more Build robust cybersecurity postures with cyber insurance & modern authentication webinar cover Build robust cybersecurity postures with cyber insurance & modern authentication Brent Deterding, CISO, Afni and Davis Hake, Co-founder, Insurtech, discuss the current cybersecurity and cyber insurance landscape and how leaders of today and tomorrow should be planning for the new age of cyber offense without breaking the bank. Read more CFOs: Lower cyber insurance premiums with phishing-resistant MFA Discover how CFOs can strengthen cybersecurity and significantly lower cyber insurance costs with Yubico’s phishing-resistant MFA. Read more Cyber insurance strategy Cyber attacks are getting more sophisticated, and expensive, leading to higher cyber insurance premiums. Phishing-resistant MFA can help set you up for success and save on costs. Read more Need cyber insurance in 2023? Reduce risk and cost with phishing-resistant MFA Attend this webinar to learn how the cyber threat landscape is changing, why modern, phishing-resistant MFA has never been more critical to thwart account takeovers and ransomware attacks and how organizations can make raising the bar for security, simple, affordable and easy, and more easily qualify for cyber insurance. Read more Achieve 100% MFA across state and local government Learn how state and local governments can ensure 100% MFA coverage to protect against modern cyber threats and meet cyber insurance requirements with the YubiKey. Read more featured cyber security Meeting enhanced cyber insurance requirements with strong authentication Cyber risk is becoming an ever-greater business liability, with 40% of business leaders reporting cyber threats as the No. 1 business risk. As a result, organizations have increasingly turned to cyber insurance to help them recover from damage or minimize impact. Read this whitepaper to learn about the changing cyber threat and cyber insurance landscape, and the best way to position your organization to qualify more easily for cyber insurance. Read more YubiKey plugged inside laptop New Cyber Insurance Requirements: Critical need for Phishing-Resistant MFA Come learn new cyber insurance requirements and ways to adopt true phishing-resistant MFA that keeps your business and users protected. Read more Cyber insurance requirements raise the security bar The cyberthreat landscape has always been worrisome, but recent news reports show a sharp growth in highly sophisticated cyber attacks of various kinds, from nation states and other bad actors. Ransomware attacks and other forms of account compromise continue to grace the news every month costing companies billions in downtime and lost opportunity. And in keeping with frequent and large payouts, cyber insurance companies have raised premiums by as much as 150-300%, and requiring organizations looking to purchase cyber insurance coverage to raise their bar for security. Read this solution brief to learn about the changing landscape and requirements, and how to protect your business and users with phishing-resistant multi-factor authentication (MFA). Read more See More

Join our newsletter

Distributed monthly, it includes product news, new applications, case studies, events, and discounts. Unsubscribe anytime.

By subscribing you agree to our Privacy Policy.
Subscribe
About us The team Innovation history Secure it forward program Yubico blog Press Room Events Partner programs Careers Investors
YubiKey 5 Series YubiKey 5 FIPS Series Security Key Series YubiKey Bio Series YubiHSM 2 & YubiHSM 2 FIPS Accessories Yubico Authenticator Computer login tools Software Development kits
YubiKey as a Service YubiEnterprise Delivery Contact Sales Yubico Enrollment Suite Professional Services
All Solutions Initiatives Industries Use cases Technologies
Setting up your YubiKey Find the right YubiKey Works with YubiKey Catalog What is a YubiKey Case studies Webinars White papers and reports Documentation All downloads Support Home Support services Buying and shipping information
LinkedIn YouTube Instagram X Facebook
  • Sitemap
  • Accessibility statement
  • Cookies
  • Legal
  • Privacy
  • Patents
  • Terms of use
  • Trust
  • Legal imprint
Yubico 2025 All Rights Reserved.