OUR BLOGS

Works with YubiKey Spotlight: Securing your password managers with the YubiKey Yubikey

Works with YubiKey Spotlight: Securing your password managers with the YubiKey Yubikey

In the ever-evolving digital landscape, safeguarding online identities has become more critical than ever. As we navigate a world filled with accounts, passwords and sensitive information, the need for robust security solutions that center around the user is paramount. Traditionally, the way to gain access to various online sites and services has only been through 
The post Works with YubiKey Spotlight: Securing your password managers with the YubiKey appeared first on Yubico.

Red Hat Enterprise Linux 9.4 adds passkey support for centrally managed users, including YubiKeys Yubikey

Red Hat Enterprise Linux 9.4 adds passkey support for centrally managed users, including YubiKeys Yubikey

As a market leader for open source software products, Red Hat is renowned for helping organizations address modern challenges to technology and cybersecurity trends through innovative solutions that meet evolving demands. Specifically, their perpetual dedication to robust security and authentication standards ensures users, enterprises and agencies can carefully monitor and regulate access to their environments
The post Red Hat Enterprise Linux 9.4 adds passkey support for centrally managed users, including YubiKeys appeared first on Yubico.

New NIST guidance on passkeys: Key takeaways for enterprises Yubikey

New NIST guidance on passkeys: Key takeaways for enterprises Yubikey

NIST recently released an update to SP800-63B to provide guidance on syncable authenticators. As FIDO passkeys continue becoming more adopted and available at a large scale, NIST guidance helps organizations properly position and plan so they can successfully implement synced passkeys both internally and externally.  Within the guidance, it’s important to understand the nuance of
The post New NIST guidance on passkeys: Key takeaways for enterprises appeared first on Yubico.

Eliminating enterprise risk: One phishing-resistant user at a time Yubikey

Eliminating enterprise risk: One phishing-resistant user at a time Yubikey

Passwords are ingrained in enterprises with traditional identity lifecycle stages, which exposes them to increasingly sophisticated cyber attacks that rely on stolen login credentials for success like phishing. Phishing is one of the greatest cybersecurity risks that enterprises face – in fact, stolen passwords are one of the largest threat vectors compromising online security today
The post Eliminating enterprise risk: One phishing-resistant user at a time appeared first on Yubico.