Our Blogs
Think “good enough” is enough? Think again about mobile devices as authenticators
Presented by David Treece, VP Solutions Architecture, Yubico & Erik Parkkonen, Sr. Solutions Architect, Yubico About this talk As your organization navigates Microsoft’s MFA mandate and other recent MFA mandates to improve your organization's security posture,...
Navigating the PCI DSS 4.0 transition and meeting compliance with phishing-resistant YubiKeys
In just a few days, on March 31, 2025, decision makers in industries that involve payment processing – including financial services, retail & hospitality and telecommunications – are tasked to finalize the transition to Payment Card Industry Data Security Standard...
Swissbit Storage for Industrial Automation and Robotics
Industrial automation and robotics have fundamentally changed production. While efficiency and productivity are increasing, the requirements for reliable and robust data storage are also growing. In my new article, I show the challenges that companies have to overcome...
One Key, Many Doors
Businesses need to protect access to restricted areas just as they need to protect access to endpoint devices and sensitive internal data. State of the art token solutions meet both requirements at the same time, saving time and money. Two developments are...
Building cyber resilience with Yubico and Microsoft
In today’s digital landscape, cyber threats are evolving at an unprecedented pace: every second, a phishing attack takes place. In fact, over 80% of these attacks are the result of stolen login credentials and almost 70% of phishing attacks relied on AI last year...
What companies should consider when it comes to the cyber security of embedded systems
In my latest blog post, I focus on the cyber security of embedded systems and the associated special requirements. In addition, there are the risks arising from the increasing networking of embedded systems. Finally, I present solutions that improve the security of...
Six requirements for Edge Server products and their fulfillment by Swissbit
In my new blog post, I delved into the topic of edge servers and explored the unique demands they place on storage solutions. By identifying six critical requirements, I was able to assess how Swissbit’s product portfolio aligns with the needs of edge computing. The...
Yubico’s commitment to innovation: Phishing-resistance as a cornerstone for cyber resilience
As phishing attacks have reached an unprecedented level of frequency and sophistication, enterprises must prioritize authentication that is phishing-resistant – regardless of the business scenario, platform or device users are working with. This is why Yubico...
Cybersecurity: EU regulations that companies should know now
In my new blog post, I highlight the importance of the current EU regulations for companies. I emphasize that companies not only need to be aware of NIS2, RED, CRA and Data Act, but also need to take proactive measures to comply with these regulations and meet their...
CEO Corner: Wrapping up a strong year, and looking ahead to 2025 and beyond
It’s no secret that 2024 was a big year of growth for Yubico, highlighted across many notable achievements by our team and increasing demand from our customers. As discussed in my previous post, following a transformative year driven by key cybersecurity trends like...
Swissbit Storage for Network and Communications
My new article focuses on the network and telecommunications industry (NetCom). These companies around the world depend on their critical data being stored securely, accessibly, and reliably often under the most demanding conditions. My article outlines solutions and...
The rise of AI-driven phishing attacks: What to know and how to be secure
As businesses continue learning the benefits that artificial intelligence (AI) assisted computing tools provide, we’re continuing to see rapid interest and adoption of the technology – especially within the enterprise. Most conversations up until recently have...
Advantages of NVMe Features for Industrial Storage
In my first blog post I provide a comprehensive overview of Non-Volatile Memory Express (NVMe), emphasizing its significance and the advantages it offers. Additionally, I outline which NVMe features are supported by Swissbit storage products, offering valuable...
Technology Authentication 101: Passkeys for Enterprises?
In my new blog post, I take a closer look at the development of FIDO Passkeys. Technology giants such as Microsoft, Google and Apple are pushing the topic of passwordless authentication on the consumer side. And on the corporate side? The Foundation of FIDO and...
Works with YubiKey Spotlight: Expanded partnerships redefining phishing-resistance in 2025
2024 was an exciting year for Yubico and our partners. Together, we achieved remarkable milestones, launching innovative solutions and forging stronger partnerships – all aimed at delivering the most impactful cybersecurity solutions and user experience for our...
EU Regulation DORA: How hardware authentication can secure financial companies
The Digital Operational Resilience Act (DORA) is the next major EU regulation to come into force. The aim of the EU regulation is to strengthen the IT security of European financial organisations. Hardware authentication via FIDO Security Key can help effectively, as...
How Swissbit is successfully promoting sustainable ways to generate, use and save energy
Swissbit's approach to sustainability is based on ethical practices, environmental awareness and social responsibility and is closely linked to the United Nations Sustainable Development Goals. We are aware that our commitment to the environment is not just a...
Cybersecurity in 2025 – part two: Insights and predictions from Yubico’s experts
In part one of our 2025 cybersecurity predictions, we highlighted insights from our experts on the topic of passkeys, digital identity wallets and the threats of AI-driven phishing – areas that saw a lot of focus in 2024, and ones that we expect to continue being a...
Cybersecurity in 2025: Insights and predictions from Yubico’s experts
With 2024 behind us, we saw another challenging year in the world of cybersecurity – highlighted by new and evolving threats like Artificial Intelligence (AI)-driven phishing and increasingly sophisticated cyber attacks overall. Yubico’s September Global State of...
Authentication 101: What makes hardware authentication so attractive to companies?
In my new “Authentication 101” blog article, I explore the question of why hardware authentication, for example with a FIDO security key such as the iShield Key, is actually so attractive for companies. Finally, I will show why I believe that we will soon have an...
State of Global Authentic(age)ion: A look at cybersecurity habits by generations
No generations were left untouched when it came to the threat of hackers in 2024: from the impact of political shakeups, to increasingly sophisticated cyber attacks targeting consumers, critical industries and infrastructures, the world was on high alert. Fueled by a...
How do you secure Raspberry Pi with the Security Upgrade Kit?
Embedded systems, IoT and OT applications such as the Raspberry Pi must be protected to prevent the data on them from being leaked, for example by physical attacks. In this example use case, we show how the new Security Upgrade Kit provides a remedy and effectively...
Yubico named finalists of German digital identity innovation competition
In 2023, Yubico began collaborating on an exciting open standards identity project – wwWallet – to shape the future of digital identity across Europe and beyond. The project saw immediate success solving problems for global identity, and was submitted in the...
Introducing new features for Yubico Authenticator for iOS
We’re excited to share the new features now available for Yubico Authenticator for iOS in the latest app update on the App Store. Many of these improvements aim to address frequently requested features from our customers, while providing additional new functionalities...
Platform independent digital identity for all
Many are understandably concerned that the great invention called the Internet, initially created by researchers for sharing information, has become a major threat to democracy, security and trust. The majority of these challenges are caused by stolen, misused or fake...
Hardware authentication: Why the iShield Key MIFARE is a milestone!
Today, I'm thrilled to unveil the iShield Key MIFARE, a groundbreaking FIDO Security Key that offers unparalleled security and convenience. In this article, I'll discuss its key benefits and why it's a superior choice compared to other FIDO Security Keys on the...
Q&A with Yubico’s CEO: Our move to the main Nasdaq market in Stockholm
As 2024 draws to a close, it’s the perfect time to reflect on the incredible journey we’ve had this year and how it has shaped where we stand today as a company. To mark this moment, I sat down with our CEO, Mattias Danielsson, to look back on the milestones and...
Plug-and-play security for drone footage
As a specialist for the professional use of drones in industry and research, we at Droneparts are also one of Germany’s leading providers of drone systems for law enforcement and security organizations. In this role, we know about the increasing importance of secure...
Exploring DORA: A look at the next major EU mandate
Financial institutions have historically managed operational risk using capital allocation, but under EU Regulation 2022/2554 – also known as the Digital Operational Resilience Act (DORA) – the financial sector and associated entities in the European Economic Area...
Social Robots: Where AI Meets Data Protection
When we hear the term "robot", we often think first of the highly automated machinery used in industrial production. However, a new generation of robots, also known as "social robots", is conquering completely new areas - namely those that require intensive...