YubiKey 5Ci: First security key designed with both USB-C and Lightning connectors
This unique dual-connector functionality makes the YubiKey 5Ci the perfect solution for consumers or enterprises looking for strong hardware-backed authentication across iOS, …
How privacy and security concerns affect password practices
Yubico announced the results of the company’s 2019 State of Password and Authentication Security Behaviors Report, conducted by the Ponemon Institute, who surveyed 1,761 IT …
Yubico integrates YubiHSM 2 with AWS IoT Greengrass to deliver private key and secrets storage
Yubico unveiled that the YubiHSM 2 (hardware security module) is qualified for Amazon Web Services (AWS) Internet of Things (IoT) Greengrass Hardware Security Integration. AWS …
YubiHSM SDK secures infrastructures and cryptographic key material
Yubico released a new open source YubiHSM 2 (hardware security module) software development kit (SDK) available for developers and engineers to implement the YubiHSM 2 for an …
New infosec products of the week: September 28, 2018
Chronicle announces VirusTotal Enterprise with greater search and analysis capabilities Chronicle, the cybersecurity subsidiary of Google’s parent company Alphabet, has …
Yubico launches YubiKey 5 Series, the multi-protocol security keys supporting FIDO2
Yubico announced the launch of the YubiKey 5 Series, the multi-protocol security keys supporting FIDO2/WebAuthn. With this new addition, the YubiKey 5 Series has the …
Yubico launches FIPS 140-2 validated YubiKey series
Yubico announced the certification and availability of the YubiKey FIPS Series, a product line that meets cryptographic security requirements of the Federal Information …
Passwordless enterprise authentication on Windows 10 and Azure AD
Yubico announced that the new Security Key by Yubico supporting FIDO2 will be supported in Windows 10 devices and Microsoft Azure Active Directory (Azure AD). The feature is …
Featured news
Sponsored
Don't miss
- Gateways to havoc: Overprivileged dormant service accounts
- The growing danger of visual hacking and how to protect against it
- Beyond human IAM: The rising tide of machine identities
- Microsoft confirms second 0-day exploited by Void Banshee APT (CVE-2024-43461)
- EchoStrike: Generate undetectable reverse shells, perform process injection