Resources
Browse our library of white papers, webinars, case studies, product briefs, and more.
-
Securing Warfighters at the Tactical Edge Combatant Command Multi-Factor Authentication (MFA) Solution Read more -
Modern authentication for Federal Systems Integrators and Sub-contractors Hardware passkeys drive cyber resilience with phishing-resistant MFA and exceptional UX Read more -
Modern Authentication for Academic Medical Centers and Clinics Hardware passkeys ensure cyber resilience with phishing-resistant MFA and exceptional UX Read more -
Keeping Indian financial services organisations ahead of modern cyber threats Why Indian Banks Need Stronger MFA— And How Yubico Leads the Way Read more -
Better Together: YubiKey® and HID® OMNIKEY® Yubico and HID, leaders in trusted identities, deliver a joint solution that makes Zero Trust practical and user-friendly. Read more -
Yubico and IBM Consulting The Executive Imperative: Identity Has Become the Primary Risk Surface Digital transformation, with its shift to hybrid work, cloud, SaaS, and AI, has eliminated traditional perimeters, making identity the enterprise control plane. Meanwhile, advanced threats bypass legacy multi-factor authentication (MFA) such as SMS, push, or one-time passwords, via Adversaryin-the-Middle (AiTM), MFA fatigue, and social engineering. […] Read more -
Passwordless for retail and hospitality: where productivity meets security Stop POS Compromises and Empower Your Front-Line Staff In the fast-paced world of retail and hospitality, every second spent dealing with a login is a second taken away from a guest. True productivity happens when security makes a staff member’s life easier, allowing them to prioritize the guest standing in front of them. But shared […] Read more -
Securing Operational Technology with Yubico How expanded connectivity is reshaping cyber risk in operational technology Operational Technology (OT) supports critical infrastructure including manufacturing, energy, healthcare, and government. These OT environments consist of large-scale machines and Industrial Control Systems (ICS), including Distributed Control Systems and SCADA, to manage physical processes including machine-to-machine and human-to-machine communication. Historically, these environments were designed to […] Read more -
Accelerate your Zero Trust strategy with modern phishing-resistant MFA What is Zero Trust? A Zero Trust framework implies that an organization should trust no individual or thing unless properly verified, before being given access to the network and data. Zero Trust means you can trust no one and no thing—not the user, not the computer, and not the communication. Authentication is a core component […] Read more