A Yubico FAQ about passkeys yubikeys

A Yubico FAQ about passkeys yubikeys

In March, we published a blog called “YubiKeys, passkeys and the future of modern authentication” which took a look at the evolution of authentication from when we first introduced the YubiKey back in 2008, to where the industry is heading with the adoption and...
A Glimpse into The Future of Modern Authentication

A Glimpse into The Future of Modern Authentication

Authentication protocols have evolved rapidly since the first authentication using password was introduced in 1961 by Fernando Corbato, an MIT researcher. In 1960s, computers were huge and outrageously expensive with many users accessing the centralized computers...
When Sharing Is Not Always Caring

When Sharing Is Not Always Caring

There are many things that have changed during the pandemic. New habits are being adopted and people are beginning to embrace the changes. Businesses no longer work the way they used to. Many workplaces now prefer flexible workspaces with shared workstations to reduce...
Protecting Your Most Privileged Users Through YubiKey

Protecting Your Most Privileged Users Through YubiKey

Protecting Your Most Valuable Assets Company’s information is increasingly considered as key corporate assets. Customers’ information, financial data, important documents and product blueprints are examples of important and sensitive data that must be guarded from...
How Your Workday Is Going to Change by Using YubiKey

How Your Workday Is Going to Change by Using YubiKey

Technology has made remote working much more feasible and economical compared to on-site working. Although it is not popular until a decade ago, remote working has now become the new norm of how employees work, especially during the pandemic. In fact, a survey on more...