YUBIKEYS
ALL YUBIKEY ORDERS ARE FREE-SHIPPED
-
iShield Key FIDO2 USB-A
USD$23.38 -
iShield Key FIDO2 USB-C
USD$27.12 -
iShield Key Pro USB-A
USD$46.75 -
iShield Key Pro USB-C
USD$51.43 -
SecureUSB® KP 16GB Hardware-Encrypted USB Flash Drive with Keypad
USD$134.00 -
Security Key C NFC by Yubico
USD$38.30 -
Security Key NFC by Yubico
USD$34.00 -
TrustKey B210H
USD$67.00 -
TrustKey T110
USD$21.00 -
TrustKey T120
USD$23.00 -
YubiKey 5 Nano
USD$73.45 -
YUBIKEY 5 NFC
USD$61.28
OUR BLOGS
Hardware authentication: Why the iShield Key MIFARE is a milestone!
Today, I'm thrilled to unveil the iShield Key MIFARE, a groundbreaking FIDO Security Key that offers unparalleled security and convenience. In this article, I'll discuss its key benefits and why it's a superior choice compared to other FIDO Security Keys on the...
Q&A with Yubico’s CEO: Our move to the main Nasdaq market in Stockholm
As 2024 draws to a close, it’s the perfect time to reflect on the incredible journey we’ve had this year and how it has shaped where we stand today as a company. To mark this moment, I sat down with our CEO, Mattias Danielsson, to look back on the milestones and...
Plug-and-play security for drone footage
As a specialist for the professional use of drones in industry and research, we at Droneparts are also one of Germany’s leading providers of drone systems for law enforcement and security organizations. In this role, we know about the increasing importance of secure...
Exploring DORA: A look at the next major EU mandate
Financial institutions have historically managed operational risk using capital allocation, but under EU Regulation 2022/2554 – also known as the Digital Operational Resilience Act (DORA) – the financial sector and associated entities in the European Economic Area...
Social Robots: Where AI Meets Data Protection
When we hear the term "robot", we often think first of the highly automated machinery used in industrial production. However, a new generation of robots, also known as "social robots", is conquering completely new areas - namely those that require intensive...
Securing critical infrastructure from modern cyber threats with phishing-resistant authentication
Across the globe, 2024 has seen a whirlwind of change. With ongoing wars, recent political change-ups and more, growth in data breaches targeting critical infrastructure continue to be on the rise. Critical infrastructure is integral to our everyday life – from the...