Resources
Browse our library of white papers, webinars, case studies, product briefs, and more.
-
WebAuthn Explained: Advancing Authentication with Hardware Security Keys & Establishing a Root of Trust – Yubico Insights Establishing a “root of trust” is the mechanism in which a user recovers an account or establishes their identity on a new device Read more -
One northeastern U.S. state secured elections using MFA Election security is an increasing concern. One Northeastern state adopted mfa using hardware security keys to protect its voters Read more -
Protecting the supply chain with modern security Learn how Yubico solutions such as the YubiKey and YubiHSM 2 can help you secure your software supply chain, ensure IP security and product integrity, and provide highest-assurance security for third party access to critical systems and data. Read more -
Securing energy and natural resources against modern cyber threats Learn the critical need for phishing-resistant multi-factor authentication to safeguard this critical infrastructure and authentication best practices to close the critical threat gap that emerges from legacy authentication. Read more -
How governments and higher education can achieve 100% MFA Learn how state and local governments and higher education can drive 100 percent MFA coverage to protect against phishing and account takeovers Read more -
Strong phishing resistant MFA for EO compliance Learn how you can achieve federal compliance with YubiKeys and Microsoft Read more -
Phishing-resistant MFA for Telecoms Learn how the YubiKey can bolster existing security approaches by providing a future-proof layer of protection to safeguard people, technology, and data. Read more -
AWS Marketplace Yubico Partner Brief Learn how YubiKeys work to secure your AWS services and resources. Read more -
Graduating from legacy MFA to modern authentication Download the Yubico White Paper, Graduating from legacy MFA to modern authentication: The critical need for increased security across education, to learn authentication best practices in modernizing authentication to stop modern day cyber threats. Read more