Resources
Browse our library of white papers, webinars, case studies, product briefs, and more.
-
Securing Operational Technology with Yubico How expanded connectivity is reshaping cyber risk in operational technology Operational Technology (OT) supports critical infrastructure including manufacturing, energy, healthcare, and government. These OT environments consist of large-scale machines and Industrial Control Systems (ICS), including Distributed Control Systems and SCADA, to manage physical processes including machine-to-machine and human-to-machine communication. Historically, these environments were designed to […] Read more -
Accelerate your Zero Trust strategy with modern phishing-resistant MFA What is Zero Trust? A Zero Trust framework implies that an organization should trust no individual or thing unless properly verified, before being given access to the network and data. Zero Trust means you can trust no one and no thing—not the user, not the computer, and not the communication. Authentication is a core component […] Read more -
The ROI of Phishing-Resistance: A Total Economic Impact Study If you’re evaluating stronger authentication, the question isn’t “Does it improve security? The real question is: Does it deliver measurable business value and do you have a partner you can actually trust to execute? That’s exactly what we set out to answer in our commissioned study conducted by Forrester Consulting, The Total Economic Impact™ of […] Read more -
Beyond the login: Lifecycle management and application control You have or are looking to adopt the YubiKey to eliminate phishing and secure the front door—but true Zero Trust doesn’t stop at login. To unlock the full potential of hardware-backed security, organizations need a strategy that bridges the gap between physical authentication, daily operations, and continuous enforcement. Join Yubico and Appterix for a deep […] Read more -
TEI Report 2026 Reduced Risk, Savings, And Business Growth Enabled By YubiKeys Read more -
Entdecke mit Yubico und EgoMind die Zukunft der Authentifizierung! Hacker hacken nicht mehr, sie loggen sich ein. Read more -
Banking on Trust: Rethinking authentication in the new era of AI In an era of Gen AI, traditional authentication methods are no longer enough—sophisticated threat actors are exploiting vulnerabilities faster than ever, and both employees and customers are potential entry points. Read more -
Simplify FIDO2 key management with Microsoft Entra ID, Intercede, and Yubico By the end of this webinar, you will be equipped with the knowledge to confidently comply with the highest identity and authentication standards. Read more -
Deploying the most secure passkeys at global scale—Stop AI-powered phishing Phishing attacks aren’t going anywhere. In fact, due to the rise of sophisticated generative AI, 2026 will show high-quality phishing attacks at speeds never before seen. The answer to this problem is well known and proven: we must eliminate our reliance on passwords. To achieve this solution at scale, users must be equipped with the […] Read more