Resources
Browse our library of white papers, webinars, case studies, product briefs, and more.
-
Modernizing authentication across the Department of Defense with phishing-resistant MFA TY We hope you enjoy reading the Yubico White Paper, Modernizing authentication across the Department of Defense with phishing-resistant MFA. Read more -
Modernizing authentication across the Department of Defense with phishing-resistant MFA Learn how the DOD-approved and FIPS 140-2 validated YubiKey is helping the federal government with phishing-resistant multi-factor authentication (MFA) for modern use cases not supported by the PIV and CAC Read more -
Transcending Passwords: Emerging Trends in Authentication Watch this webinar to learn more about the business impact and trends of authentication practices, with consequences for security, productivity and employee retention. Read more -
How to get started with passwordless using device-bound passkeys Read the Yubico deployment best practices guide to get started with device-bound passkeys for your passwordless authentication journey. Read more -
Go Passwordless with Windows Hello for Business and YubiKeys Learn how Windows Hello for Business and YubiKeys work in concert to provide solutions for your organization and your customers. Read more -
Safeguard your Microsoft ecosystem with a Zero Trust strategy Thank You We hope you enjoy reading the Yubico white paper, Safeguard your Microsoft ecosystem with a Zero Trust strategy. Read more -
Safeguard your Microsoft ecosystem with a Zero Trust strategy Learn why there is a critical need for phishing-resistant MFA to support Zero Trust for Microsoft environments. Read more -
Making the internet safer with modern authentication Learn more about how Yubico helps secure global enterprises, SMBs, and individuals with modern phishing-resistant multi-factor authentication (MFA) and passwordless. Elevate your cyber resilience and accelerate your zero trust strategy with modern authentication that stops phishing attacks and account takeovers before they start. Read more -
Transcending Passwords: The Next Generation of Authentication Thank You We hope you enjoy reading the report, Transcending passwords: The next generation of authentication. Read more