Our Blogs
What companies should consider when it comes to the cyber security of embedded systems
In my latest blog post, I focus on the cyber security of embedded systems and the associated special requirements. In addition, there are the risks arising from the increasing networking of embedded systems. Finally, I present solutions that improve the security of...
Six requirements for Edge Server products and their fulfillment by Swissbit
In my new blog post, I delved into the topic of edge servers and explored the unique demands they place on storage solutions. By identifying six critical requirements, I was able to assess how Swissbit’s product portfolio aligns with the needs of edge computing. The...
Yubico’s commitment to innovation: Phishing-resistance as a cornerstone for cyber resilience
As phishing attacks have reached an unprecedented level of frequency and sophistication, enterprises must prioritize authentication that is phishing-resistant – regardless of the business scenario, platform or device users are working with. This is why Yubico...
Cybersecurity: EU regulations that companies should know now
In my new blog post, I highlight the importance of the current EU regulations for companies. I emphasize that companies not only need to be aware of NIS2, RED, CRA and Data Act, but also need to take proactive measures to comply with these regulations and meet their...
CEO Corner: Wrapping up a strong year, and looking ahead to 2025 and beyond
It’s no secret that 2024 was a big year of growth for Yubico, highlighted across many notable achievements by our team and increasing demand from our customers. As discussed in my previous post, following a transformative year driven by key cybersecurity trends like...
Swissbit Storage for Network and Communications
My new article focuses on the network and telecommunications industry (NetCom). These companies around the world depend on their critical data being stored securely, accessibly, and reliably often under the most demanding conditions. My article outlines solutions and...
The rise of AI-driven phishing attacks: What to know and how to be secure
As businesses continue learning the benefits that artificial intelligence (AI) assisted computing tools provide, we’re continuing to see rapid interest and adoption of the technology – especially within the enterprise. Most conversations up until recently have...
Advantages of NVMe Features for Industrial Storage
In my first blog post I provide a comprehensive overview of Non-Volatile Memory Express (NVMe), emphasizing its significance and the advantages it offers. Additionally, I outline which NVMe features are supported by Swissbit storage products, offering valuable...
Technology Authentication 101: Passkeys for Enterprises?
In my new blog post, I take a closer look at the development of FIDO Passkeys. Technology giants such as Microsoft, Google and Apple are pushing the topic of passwordless authentication on the consumer side. And on the corporate side? The Foundation of FIDO and...
Works with YubiKey Spotlight: Expanded partnerships redefining phishing-resistance in 2025
2024 was an exciting year for Yubico and our partners. Together, we achieved remarkable milestones, launching innovative solutions and forging stronger partnerships – all aimed at delivering the most impactful cybersecurity solutions and user experience for our...
EU Regulation DORA: How hardware authentication can secure financial companies
The Digital Operational Resilience Act (DORA) is the next major EU regulation to come into force. The aim of the EU regulation is to strengthen the IT security of European financial organisations. Hardware authentication via FIDO Security Key can help effectively, as...
How Swissbit is successfully promoting sustainable ways to generate, use and save energy
Swissbit's approach to sustainability is based on ethical practices, environmental awareness and social responsibility and is closely linked to the United Nations Sustainable Development Goals. We are aware that our commitment to the environment is not just a...
Cybersecurity in 2025 – part two: Insights and predictions from Yubico’s experts
In part one of our 2025 cybersecurity predictions, we highlighted insights from our experts on the topic of passkeys, digital identity wallets and the threats of AI-driven phishing – areas that saw a lot of focus in 2024, and ones that we expect to continue being a...
Cybersecurity in 2025: Insights and predictions from Yubico’s experts
With 2024 behind us, we saw another challenging year in the world of cybersecurity – highlighted by new and evolving threats like Artificial Intelligence (AI)-driven phishing and increasingly sophisticated cyber attacks overall. Yubico’s September Global State of...
Authentication 101: What makes hardware authentication so attractive to companies?
In my new “Authentication 101” blog article, I explore the question of why hardware authentication, for example with a FIDO security key such as the iShield Key, is actually so attractive for companies. Finally, I will show why I believe that we will soon have an...
State of Global Authentic(age)ion: A look at cybersecurity habits by generations
No generations were left untouched when it came to the threat of hackers in 2024: from the impact of political shakeups, to increasingly sophisticated cyber attacks targeting consumers, critical industries and infrastructures, the world was on high alert. Fueled by a...
How do you secure Raspberry Pi with the Security Upgrade Kit?
Embedded systems, IoT and OT applications such as the Raspberry Pi must be protected to prevent the data on them from being leaked, for example by physical attacks. In this example use case, we show how the new Security Upgrade Kit provides a remedy and effectively...
Yubico named finalists of German digital identity innovation competition
In 2023, Yubico began collaborating on an exciting open standards identity project – wwWallet – to shape the future of digital identity across Europe and beyond. The project saw immediate success solving problems for global identity, and was submitted in the...
Introducing new features for Yubico Authenticator for iOS
We’re excited to share the new features now available for Yubico Authenticator for iOS in the latest app update on the App Store. Many of these improvements aim to address frequently requested features from our customers, while providing additional new functionalities...
Platform independent digital identity for all
Many are understandably concerned that the great invention called the Internet, initially created by researchers for sharing information, has become a major threat to democracy, security and trust. The majority of these challenges are caused by stolen, misused or fake...
Hardware authentication: Why the iShield Key MIFARE is a milestone!
Today, I'm thrilled to unveil the iShield Key MIFARE, a groundbreaking FIDO Security Key that offers unparalleled security and convenience. In this article, I'll discuss its key benefits and why it's a superior choice compared to other FIDO Security Keys on the...
Q&A with Yubico’s CEO: Our move to the main Nasdaq market in Stockholm
As 2024 draws to a close, it’s the perfect time to reflect on the incredible journey we’ve had this year and how it has shaped where we stand today as a company. To mark this moment, I sat down with our CEO, Mattias Danielsson, to look back on the milestones and...
Plug-and-play security for drone footage
As a specialist for the professional use of drones in industry and research, we at Droneparts are also one of Germany’s leading providers of drone systems for law enforcement and security organizations. In this role, we know about the increasing importance of secure...
Exploring DORA: A look at the next major EU mandate
Financial institutions have historically managed operational risk using capital allocation, but under EU Regulation 2022/2554 – also known as the Digital Operational Resilience Act (DORA) – the financial sector and associated entities in the European Economic Area...
Social Robots: Where AI Meets Data Protection
When we hear the term "robot", we often think first of the highly automated machinery used in industrial production. However, a new generation of robots, also known as "social robots", is conquering completely new areas - namely those that require intensive...
Securing critical infrastructure from modern cyber threats with phishing-resistant authentication
Across the globe, 2024 has seen a whirlwind of change. With ongoing wars, recent political change-ups and more, growth in data breaches targeting critical infrastructure continue to be on the rise. Critical infrastructure is integral to our everyday life – from the...
Yubico Enrollment Suite for Microsoft users is here: Meet Yubico at Microsoft Ignite 2024
On the heels of announcing the availability of Yubico Enrollment Suite for Microsoft users today, we’re excited to be back at Microsoft Ignite in Chicago this week to meet with all our valued customers and partners. If you’ll be at the conference, be sure to visit us...
Yubico Enrollment Suite with Okta now available: An inside look at how Okta became a phishing-resistant enterprise
Phishing-resistant users build phishing-resistant enterprises. With the growing sophistication of cyber threats, enterprises that can efficiently raise the bar for security helps ensure protection of users and their data to effectively drive digital acceleration. To...
Yubico submits YubiKey 5 FIPS Series for FIPS 140-3 validation
We’re excited to share that the YubiKey 5 FIPS Series latest 5.7.4 firmware has completed testing by our NIST accredited testing lab, and has been submitted to the Cryptographic Module Validation Program (CMVP) for FIPS 140-3 validation, Overall Level 2 and Physical...
Available now: YubiKey Bio Series – Multi-protocol Edition keys expand phishing-resistant authentication options for enterprises
As adoption of biometric logins continues to increase globally, enterprises and cybersecurity teams require stronger security combined with user convenience to improve user adoption of multi-factor authentication (MFA) and ensure productivity. Hardware security keys...