Resource Category: Solution briefs
-
Securing Warfighters at the Tactical Edge Combatant Command Multi-Factor Authentication (MFA) Solution Read more -
Modern authentication for Federal Systems Integrators and Sub-contractors Hardware passkeys drive cyber resilience with phishing-resistant MFA and exceptional UX Read more -
Modern Authentication for Academic Medical Centers and Clinics Hardware passkeys ensure cyber resilience with phishing-resistant MFA and exceptional UX Read more -
Keeping Indian financial services organisations ahead of modern cyber threats Why Indian Banks Need Stronger MFA— And How Yubico Leads the Way Read more -
Better Together: YubiKey® and HID® OMNIKEY® Yubico and HID, leaders in trusted identities, deliver a joint solution that makes Zero Trust practical and user-friendly. Read more -
Yubico and IBM Consulting The Executive Imperative: Identity Has Become the Primary Risk Surface Digital transformation, with its shift to hybrid work, cloud, SaaS, and AI, has eliminated traditional perimeters, making identity the enterprise control plane. Meanwhile, advanced threats bypass legacy multi-factor authentication (MFA) such as SMS, push, or one-time passwords, via Adversaryin-the-Middle (AiTM), MFA fatigue, and social engineering. […] Read more -
Securing Operational Technology with Yubico How expanded connectivity is reshaping cyber risk in operational technology Operational Technology (OT) supports critical infrastructure including manufacturing, energy, healthcare, and government. These OT environments consist of large-scale machines and Industrial Control Systems (ICS), including Distributed Control Systems and SCADA, to manage physical processes including machine-to-machine and human-to-machine communication. Historically, these environments were designed to […] Read more -
Accelerate your Zero Trust strategy with modern phishing-resistant MFA What is Zero Trust? A Zero Trust framework implies that an organization should trust no individual or thing unless properly verified, before being given access to the network and data. Zero Trust means you can trust no one and no thing—not the user, not the computer, and not the communication. Authentication is a core component […] Read more -
Keeping financial services organizations in the United Arab Emirates ahead of modern cyber threats Why banks need stronger MFA— and how YubiKey leads the way Read more -
6 best practices to protect your customers online Learn key best practices to protect your business reputation and ensure your end customers stay protected against phishing attacks Read more