Resources
Browse our library of white papers, webinars, case studies, product briefs, and more.
-
Banking on Trust: Rethinking authentication in the new era of AI In an era of Gen AI, traditional authentication methods are no longer enough—sophisticated threat actors are exploiting vulnerabilities faster than ever, and both employees and customers are potential entry points. Read more -
Simplify FIDO2 key management with Microsoft Entra ID, Intercede, and Yubico By the end of this webinar, you will be equipped with the knowledge to confidently comply with the highest identity and authentication standards. Read more -
Deploying the most secure passkeys at global scale—Stop AI-powered phishing Phishing attacks aren’t going anywhere. In fact, due to the rise of sophisticated generative AI, 2026 will show high-quality phishing attacks at speeds never before seen. The answer to this problem is well known and proven: we must eliminate our reliance on passwords. To achieve this solution at scale, users must be equipped with the […] Read more -
Versasec and Yubico Fast-Track Secure Identity—Turnkey User Enrollment Secure Your Enterprise with FIDO Pre-registered YubiKeys and Complete Enterprise Lifecycle Management According to the JumpCloud 2024 IT Trends Report, a substantial 83% of organizations still rely on vulnerable password-based authentication, and even highly regulated agencies fall short of deploying phishing-resistant hardware tokens. To address this critical challenge and accelerate the adoption of superior security, […] Read more -
Keeping financial services organizations in the United Arab Emirates ahead of modern cyber threats Why banks need stronger MFA— and how YubiKey leads the way Read more -
When Cyber Threats Feel Human: The 2026 Identity Wake-Up Call Join us as we unpack Yubico’s 2025 Global State of Authentication survey, evolving threats, and the regulatory landscape. Read more -
The Scale-Up Secret: How Keeper Security secured operations and saved time with Yubico When it comes to securing the enterprise, what if you could deploy hardware security keys company-wide in months, not years? Read more -
Gartner® Modernize Legacy Workforce Authentication Now or Remain Insecure Learn why replacing legacy authentication with modern phishing-resistant MFA and passwordless solutions is a critical priority. Read more -
From passwords to passkeys: The next leap in secure access With AI-driven phishing, credential stuffing, and deepfakes on the rise, phishing-resistant, user-friendly authentication is now more essential than ever. Read more