Resources
Browse our library of white papers, webinars, case studies, product briefs, and more.
-
NIS2 Compliance The NIS2 Directive, effective January 2023, expands the scope of the original NIS Directive to include stricter cybersecurity requirements across more sectors in the EU. It mandates enhanced security measures like incident reporting, multi-factor authentication, and supply chain security, with penalties for non-compliance reaching up to €10M or 2% of annual revenue. Organizations must ensure compliance by October 2024 to avoid significant fines and operational risks. Read more -
How to get started with the YubiKey for education Thank You We hope you enjoy reading the Yubico Best Practices Guide, How to get started with the YubiKey for education. Read more -
How to get started with the YubiKey for education Learn the six deployment best practices to protect your education organization from cyberattacks and accelerate adoption at scale. Read more -
Modern authentication for high-tech manufacturers Download this free brochure to learn how Yubico solutions safeguard critical IT and OT systems, sensitive IP, and the supply chain for high tech manufacturers. Read more -
Build cyber resilience with Yubico and Microsoft to accelerate to passwordless Join us as we investigate lessons learned from incidents such as Crowdstrike and MGM Grand, and examine different passkey solutions and how they fit into building a resilient, phishing-resistant organization. Read more -
The evolving threat of phishing and social engineering The report classifies the three major passkey credentials in the market and highlights the benefits of creating phishing-resistant users. Read more -
The evolving threat of phishing and social engineering thank you We hope you enjoy reading the EMA report: The evolving threat of phishing and social engineering. Thank you. Read more -
Active Directory Security Management: From Threat Detection to Effective Response Join us for this informative session to enhance your AD security management skills and safeguard your organization’s critical assets. Read more -
Securing Your Organization with YubiKeys at Scale – Part 2 Join us for this in-depth session as we navigate the YubiKey journey, equipping you with the knowledge and tools to elevate your organization’s rollout strategy with confidence. Read more