Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Yubico Inc.

Yubico was founded in Sweden 2007 with the mission to make secure login easy and available for everyone. In 2011, Stina, CEO & Founder, and Jakob, Chief Innovation Officer & Founder, moved to Silicon Valley to make the dream happen. In close collaboration with the leading internet companies and thought leaders we created native support for our security keys in the major online platforms and browsers, enabling a safer internet for billions of people.

Our Website: https://www.yubico.com/


Latest Content From Yubico Inc.

Webcast: Beyond Passwords: New Thinking and Strategies for Authentication

by Yubico Inc.Jan 27, 2022

The debate about the usefulness of passwords rages on. But most security experts agree that data protection is not adequate with simple password protection. Which tools and strategies for authentication should you consider today to up-level your authentication strategy? How can you move beyond the password and implement next generation authentication technology? In this webinar, experts offer a broad look at your options for multifactor authentication, the challenges and pitfalls of these options, and how to develop an authentication strategy that works best for your enterprise.


Webcast: Zero-Trust in Real Life

by Yubico Inc.Nov 02, 2021

Credential theft, lateral movement and other cyber attack tricks have foiled perimeter security again and again. We know that the old philosophy of trusting everything and everyone inside a network is no longer sound. The zero-trust model – trust nothing, verify everything – is the proposed answer to this problem. But it’s easier said than done in real enterprise. At this webinar, learn what zero-trust really looks like in practice, how to overcome challenges along the way, what security benefits you’ll realize right away, and how your organization can take the first steps toward implementing a zero-trust model.