Resources
Browse our library of white papers, webinars, case studies, product briefs, and more.
-
Building a phishing-resistant enterprise with device-bound passkeys Building an enterprise that stops account takeovers with phishing-resistant MFA using a device-bound passkey strategy. Read more -
Protect manufacturers from modern cyber threats Manufacturers of all kinds are being targeted by ransomware and phishing at an alarming rate. They need modern MFA that protects existing infrastructure while enabling the move to stronger phishing-resistant methods. Learn how Yubico can help safeguard your production and profits with phishing-resistant MFA and hardware-backed security. Read more -
Securing Department of Corrections with modern, phishing-resistant MFA Learn how the YubiKey stops modern cyber threats such as phishing attacks and account takeovers across the Department of Corrections, with CJIS compliant phishing-resistant multi-factor and passwordless authentication. Read more -
Modern authentication for the modern naval war fighter Download the free brochure to learn how the YubiKey solves U.S. Navy modernization uses cases. Read more -
How to get started with phishing-resistant MFA to secure healthcare Download the healthcare best practices guide to learn six deployment best practices to accelerate adoption at scale. Read more -
Secure your AWS environment with highest-assurance phishing-resistant MFA Download the best practice guide to learn more how you can stop account takeovers and go passwordless for a wide variety of AWS use cases Read more -
Enterprise passkey implementations: Key considerations and tradeoffs Join this webinar to learn more about the different types of passkey implementations and gain an understanding of real life enterprise scenarios. Read more -
Securing financial services with modern, phishing-resistant MFA Learn how the YubiKey helps financial organizations drive high security against modern cyber threats and high user productivity with the best user experience. Read more -
Securing remote workers with phishing-resistant MFA Learn why legacy authentication such as usernames and passwords, and mobile-based authenticators don’t protect remote workers against phishing attacks and account takeovers, and how the YubiKey ensures phishing-resistant multi-factor and passwordless authentication for critical remote work authentication business scenarios. Read more