OUR BLOGS

QR codes within enterprise security: Key considerations and best practices Yubikey

QR codes within enterprise security: Key considerations and best practices Yubikey

Every second, a phishing attack takes place. In fact, over 80% of cyber attacks are a result of stolen login credentials from attacks like phishing – mostly due to the relatively low cost and high success rate to execute these attacks. Unfortunately, this pattern will continue to grow as attackers become more sophisticated, utilizing tools
The post QR codes within enterprise security: Key considerations and best practices appeared first on Yubico.

Yubico joins CISA and the Joint Cyber Defense Collaborative’s High-Risk Communities Protection initiative to continue helping secure high-risk individuals and organizations

Yubico joins CISA and the Joint Cyber Defense Collaborative’s High-Risk Communities Protection initiative to continue helping secure high-risk individuals and organizations

Written by: David Treece We’re honored to share that today we are joining the Cybersecurity & Infrastructure Security Agency (CISA) as they launch a new webpage to provide resources for high-risk individuals and organizations to receive the tools they need to...

Microsoft’s Surface Pro 10 for Business enables NFC-based passwordless authentication with YubiKeys Yubikey

Microsoft’s Surface Pro 10 for Business enables NFC-based passwordless authentication with YubiKeys Yubikey

Microsoft has consistently been a pioneer and architect of digital innovations that raises the bar for what technology can accomplish – especially within cybersecurity. Their mission to empower every organization to achieve more is highlighted in advancements in new products – including today’s announcement of Surface Pro 10 for Business which prioritizes security and user
The post Microsoft’s Surface Pro 10 for Business enables NFC-based passwordless authentication with YubiKeys appeared first on Yubico.

Five tips to maximize your consumer-facing passkey implementation Yubikey

Five tips to maximize your consumer-facing passkey implementation Yubikey

Passkeys have taken the online security world by storm since their inception in mid-2022, even if the underlying technology can technically be traced back to FIDO2 and its breakthrough onto the world stage in 2018. Popularity has no doubt exploded due to their widespread adoption by the world’s largest tech companies – who also happen
The post Five tips to maximize your consumer-facing passkey implementation appeared first on Yubico.

How to implement a CryptoTokenKit extension on iOS Yubikey

How to implement a CryptoTokenKit extension on iOS Yubikey

In previous blog posts here and here, we’ve shared how you can use a YubiKey and its PIV Smart Card application together with the Yubico Authenticator app for iOS. Essentially, you can now use your YubiKey to authenticate in Safari and many other applications on iOS using certificate-based authentication backed by the PIV Smart Card …
The post How to implement a CryptoTokenKit extension on iOS appeared first on Yubico.

A Yubico FAQ about passkeys yubikeys

A Yubico FAQ about passkeys yubikeys

In March, we published a blog called “YubiKeys, passkeys and the future of modern authentication” which took a look at the evolution of authentication from when we first introduced the YubiKey back in 2008, to where the industry is heading with the adoption and...