Our Blogs

News, News and Events, Our Blogs, Yubikey SEO bot

Empowering enterprise security at scale with new product innovations: YubiKey 5.7 and Yubico Authenticator 7 Yubikey

As phishing attacks evolve and are on the rise, organizations are continuously seeking modern, strong authentication technologies like FIDO-based passwordless logins and smart card solutions to safeguard their digital assets, employees, customers and partners. By embracing passwordless authentication and implementing unmatched security measures, organizations can safeguard their sensitive data and ensure a resilient defense against
The post Empowering enterprise security at scale with new product innovations: YubiKey 5.7 and Yubico Authenticator 7 appeared first on Yubico.

News, News and Events, Our Blogs, Yubikey SEO bot

Works with YubiKey Spotlight (World Password Day Edition): Empowering enterprises to a passwordless future through integrated solutions with key partners Yubikey

Today, May 2nd, is World Password Day. Each year, this serves as an annual reminder to take action and steps to  ensure our digital lives are secure. Now, more than ever with data breaches relying on poor password management to gain access to sensitive data, this day has become a cornerstone in promoting cybersecurity awareness
The post Works with YubiKey Spotlight (World Password Day Edition): Empowering enterprises to a passwordless future through integrated solutions with key partners appeared first on Yubico.

News, News and Events, Our Blogs, Yubico, Yubikey SEO bot

From passwords to passkeys: Entering a new era in cybersecurity Yubikey

Phishing, a common tactic used by hackers to obtain access to sensitive information, is accredited as a contributing factor in over 80% of all security breaches. Phishing occurs when malicious actors impersonate a legitimate entity to deceive people into providing personal information  – typically via email, social media, text messages, or fake websites. Once the
The post From passwords to passkeys: Entering a new era in cybersecurity appeared first on Yubico.

Our Blogs, Yubikey SEO bot

QR codes within enterprise security: Key considerations and best practices Yubikey

Every second, a phishing attack takes place. In fact, over 80% of cyber attacks are a result of stolen login credentials from attacks like phishing – mostly due to the relatively low cost and high success rate to execute these attacks. Unfortunately, this pattern will continue to grow as attackers become more sophisticated, utilizing tools
The post QR codes within enterprise security: Key considerations and best practices appeared first on Yubico.

News, News and Events, Our Blogs, Yubikey SEO bot

Microsoft’s Surface Pro 10 for Business enables NFC-based passwordless authentication with YubiKeys Yubikey

Microsoft has consistently been a pioneer and architect of digital innovations that raises the bar for what technology can accomplish – especially within cybersecurity. Their mission to empower every organization to achieve more is highlighted in advancements in new products – including today’s announcement of Surface Pro 10 for Business which prioritizes security and user
The post Microsoft’s Surface Pro 10 for Business enables NFC-based passwordless authentication with YubiKeys appeared first on Yubico.

News, News and Events, Our Blogs, Yubikey SEO bot

Five tips to maximize your consumer-facing passkey implementation Yubikey

Passkeys have taken the online security world by storm since their inception in mid-2022, even if the underlying technology can technically be traced back to FIDO2 and its breakthrough onto the world stage in 2018. Popularity has no doubt exploded due to their widespread adoption by the world’s largest tech companies – who also happen
The post Five tips to maximize your consumer-facing passkey implementation appeared first on Yubico.

News, Our Blogs

Making Zero Trust Real

Zero Trust is rapidly becoming the security model of choice among IT leaders as it is a valid and trusted approach to identity security. With a more intentional method for security and privileged access management, Zero Trust’s mantra of “never trust, always verify” differs from the least privileged model.

Shopping Cart
Scroll to Top