Our Blogs

Works with YubiKey Spotlight: Securing your password managers with the YubiKey Yubikey

Works with YubiKey Spotlight: Securing your password managers with the YubiKey Yubikey

In the ever-evolving digital landscape, safeguarding online identities has become more critical than ever. As we navigate a world filled with accounts, passwords and sensitive information, the need for robust security solutions that center around the user is paramount. Traditionally, the way to gain access to various online sites and services has only been through 
The post Works with YubiKey Spotlight: Securing your password managers with the YubiKey appeared first on Yubico.

Red Hat Enterprise Linux 9.4 adds passkey support for centrally managed users, including YubiKeys Yubikey

Red Hat Enterprise Linux 9.4 adds passkey support for centrally managed users, including YubiKeys Yubikey

As a market leader for open source software products, Red Hat is renowned for helping organizations address modern challenges to technology and cybersecurity trends through innovative solutions that meet evolving demands. Specifically, their perpetual dedication to robust security and authentication standards ensures users, enterprises and agencies can carefully monitor and regulate access to their environments
The post Red Hat Enterprise Linux 9.4 adds passkey support for centrally managed users, including YubiKeys appeared first on Yubico.

New NIST guidance on passkeys: Key takeaways for enterprises Yubikey

New NIST guidance on passkeys: Key takeaways for enterprises Yubikey

NIST recently released an update to SP800-63B to provide guidance on syncable authenticators. As FIDO passkeys continue becoming more adopted and available at a large scale, NIST guidance helps organizations properly position and plan so they can successfully implement synced passkeys both internally and externally.  Within the guidance, it’s important to understand the nuance of
The post New NIST guidance on passkeys: Key takeaways for enterprises appeared first on Yubico.

Eliminating enterprise risk: One phishing-resistant user at a time Yubikey

Eliminating enterprise risk: One phishing-resistant user at a time Yubikey

Passwords are ingrained in enterprises with traditional identity lifecycle stages, which exposes them to increasingly sophisticated cyber attacks that rely on stolen login credentials for success like phishing. Phishing is one of the greatest cybersecurity risks that enterprises face – in fact, stolen passwords are one of the largest threat vectors compromising online security today
The post Eliminating enterprise risk: One phishing-resistant user at a time appeared first on Yubico.

Now available for purchase: YubiKey 5 Series and Security Key Series with new 5.7 firmware  Yubikey

Now available for purchase: YubiKey 5 Series and Security Key Series with new 5.7 firmware  Yubikey

Earlier this month, we announced the launch of Yubico Authenticator 7 as well as the upcoming availability of YubiKey 5.7 firmware. Beginning today, we’re excited to share that YubiKey 5 Series, Security Key Series, and Security Key Series – Enterprise Edition keys purchased and shipped from Yubico will include the new firmware. Keys with the
The post Now available for purchase: YubiKey 5 Series and Security Key Series with new 5.7 firmware  appeared first on Yubico.

Empowering enterprise security at scale with new product innovations: YubiKey 5.7 and Yubico Authenticator 7 Yubikey

Empowering enterprise security at scale with new product innovations: YubiKey 5.7 and Yubico Authenticator 7 Yubikey

As phishing attacks evolve and are on the rise, organizations are continuously seeking modern, strong authentication technologies like FIDO-based passwordless logins and smart card solutions to safeguard their digital assets, employees, customers and partners. By embracing passwordless authentication and implementing unmatched security measures, organizations can safeguard their sensitive data and ensure a resilient defense against
The post Empowering enterprise security at scale with new product innovations: YubiKey 5.7 and Yubico Authenticator 7 appeared first on Yubico.

Works with YubiKey Spotlight (World Password Day Edition): Empowering enterprises to a passwordless future through integrated solutions with key partners Yubikey

Works with YubiKey Spotlight (World Password Day Edition): Empowering enterprises to a passwordless future through integrated solutions with key partners Yubikey

Today, May 2nd, is World Password Day. Each year, this serves as an annual reminder to take action and steps to  ensure our digital lives are secure. Now, more than ever with data breaches relying on poor password management to gain access to sensitive data, this day has become a cornerstone in promoting cybersecurity awareness
The post Works with YubiKey Spotlight (World Password Day Edition): Empowering enterprises to a passwordless future through integrated solutions with key partners appeared first on Yubico.

From passwords to passkeys: Entering a new era in cybersecurity Yubikey

From passwords to passkeys: Entering a new era in cybersecurity Yubikey

Phishing, a common tactic used by hackers to obtain access to sensitive information, is accredited as a contributing factor in over 80% of all security breaches. Phishing occurs when malicious actors impersonate a legitimate entity to deceive people into providing personal information  – typically via email, social media, text messages, or fake websites. Once the
The post From passwords to passkeys: Entering a new era in cybersecurity appeared first on Yubico.

QR codes within enterprise security: Key considerations and best practices Yubikey

QR codes within enterprise security: Key considerations and best practices Yubikey

Every second, a phishing attack takes place. In fact, over 80% of cyber attacks are a result of stolen login credentials from attacks like phishing – mostly due to the relatively low cost and high success rate to execute these attacks. Unfortunately, this pattern will continue to grow as attackers become more sophisticated, utilizing tools
The post QR codes within enterprise security: Key considerations and best practices appeared first on Yubico.

Yubico joins CISA and the Joint Cyber Defense Collaborative’s High-Risk Communities Protection initiative to continue helping secure high-risk individuals and organizations

Yubico joins CISA and the Joint Cyber Defense Collaborative’s High-Risk Communities Protection initiative to continue helping secure high-risk individuals and organizations

Written by: David Treece We’re honored to share that today we are joining the Cybersecurity & Infrastructure Security Agency (CISA) as they launch a new webpage to provide resources for high-risk individuals and organizations to receive the tools they need to...

Microsoft’s Surface Pro 10 for Business enables NFC-based passwordless authentication with YubiKeys Yubikey

Microsoft’s Surface Pro 10 for Business enables NFC-based passwordless authentication with YubiKeys Yubikey

Microsoft has consistently been a pioneer and architect of digital innovations that raises the bar for what technology can accomplish – especially within cybersecurity. Their mission to empower every organization to achieve more is highlighted in advancements in new products – including today’s announcement of Surface Pro 10 for Business which prioritizes security and user
The post Microsoft’s Surface Pro 10 for Business enables NFC-based passwordless authentication with YubiKeys appeared first on Yubico.

Five tips to maximize your consumer-facing passkey implementation Yubikey

Five tips to maximize your consumer-facing passkey implementation Yubikey

Passkeys have taken the online security world by storm since their inception in mid-2022, even if the underlying technology can technically be traced back to FIDO2 and its breakthrough onto the world stage in 2018. Popularity has no doubt exploded due to their widespread adoption by the world’s largest tech companies – who also happen
The post Five tips to maximize your consumer-facing passkey implementation appeared first on Yubico.

How to implement a CryptoTokenKit extension on iOS Yubikey

How to implement a CryptoTokenKit extension on iOS Yubikey

In previous blog posts here and here, we’ve shared how you can use a YubiKey and its PIV Smart Card application together with the Yubico Authenticator app for iOS. Essentially, you can now use your YubiKey to authenticate in Safari and many other applications on iOS using certificate-based authentication backed by the PIV Smart Card …
The post How to implement a CryptoTokenKit extension on iOS appeared first on Yubico.

A Yubico FAQ about passkeys yubikeys

A Yubico FAQ about passkeys yubikeys

In March, we published a blog called “YubiKeys, passkeys and the future of modern authentication” which took a look at the evolution of authentication from when we first introduced the YubiKey back in 2008, to where the industry is heading with the adoption and...

A Glimpse into The Future of Modern Authentication

A Glimpse into The Future of Modern Authentication

The IT industry quickly adapted this methodology and OTP became widely used in many organizations and companies. Different OTP standards were developed, which eventually led to OAuth, a standard to standardize types of OTP. This period also saw the emergence of 2FA (Two Factors Authentication) and MFA (Multi Factors Authentication)

When Sharing Is Not Always Caring

When Sharing Is Not Always Caring

There are many things that have changed during the pandemic. New habits are being adopted and people are beginning to embrace the changes. Businesses no longer work the way they used to. Many workplaces now prefer flexible workspaces with shared workstations to reduce office rent cost and encourage hybrid working.

Protecting Your Most Privileged Users Through YubiKey

Protecting Your Most Privileged Users Through YubiKey

Company’s information is increasingly considered as key corporate assets. Customers’ information, financial data, important documents and product blueprints are examples of important and sensitive data that must be guarded from unauthorized access to maintain information security

Making Zero Trust Real

Making Zero Trust Real

Zero Trust is rapidly becoming the security model of choice among IT leaders as it is a valid and trusted approach to identity security. With a more intentional method for security and privileged access management, Zero Trust’s mantra of “never trust, always verify” differs from the least privileged model.

Are You Sure Your Password is Good Enough?

Are You Sure Your Password is Good Enough?

With the increasing internet usage from accessing your email, online shopping, social media, to online business meeting, internet users have to deal with dozensof passwords to deal with. Both for personal and work purposes, managing different passwords for various accounts can be troublesome.

7 Benefit of Using Password Manager

7 Benefit of Using Password Manager

A password vault stores your passwords securely, allowing you to save the information in the cloud or on your personal computer. This allows you to use truly random combinations in all your passwords, making them much harder for malicious users or bots to crack. Password managers also protect you from giving away private information by mistakes. In fact, there are multiple reasons why you should be using a password manager right now.