What businesses need to know about information security – an overview of technical tools
Unauthorised access to personal information, financial accounts or trade secrets can cause a lot of damage. This can lead to large losses due to the loss of reputation and financial assets, violation of user privacy, etc. Therefore, every person, organisation, business or financial institution must take care of data protection.
Cybersecurity outsourcing – is it really dangerous and expensive?
Cybersecurity is a constant race against the clock: hackers find vulnerable chains and try to gain access to confidential information, while security experts build security systems that attackers try to break into after a while. And this happens all the time....
How to choose a quality USB token or security key
What is a USB token and how to use itThe concept of a USB token Since protecting accounts with a login and password has long been outdated, back in the early 2000s, many manufacturers began to offer USB tokens as an alternative solution. These are...
Two-factor authentication
Two-factor authentication Two-factor authentication In the modern world of computer tech, when it comes to information and personal data protection the use of passwords only is no longer reliable. It’s no secret, that even complex combinations of...
More about YubiKey products
YubiKey 5 series
YubiKey FIPS series
Security Key
YubiKey Bio series
YubiHSM 2
Compatible with Yubikey
Useful Information
How to set up a YubiKey in Linux using call-response
YubiKey hardware security keys make your system more secure. And the procedure of logging into accounts is faster and more convenient. Follow the instructions below to easily add the required settings on your Linux system.Setting up the YubiKey in Linux is quite...
5 ways to install Yubico software on Linux
To use YubiKeys on a Linux system, you will need to install the appropriate Yubico software: Yubico authenticator; YubiKey Manager; Built-in repositories; Yubico PPA packages; Compilation from the source code. Installing the Yubico Authenticator There are several ways...
How to configure YubiKey on Linux using U2F function
With the help of YubiKey hardware security keys, your system receives an increased level of protection, and the process of logging into accounts becomes faster and more convenient. To easily configure the necessary parameters on a Linux system, you should follow the...
All categories
Getting to know the YubiKey
YubiKey for developers
YubiKey for private individuals
Pick up the YubiKey
Compare YubiKey
Buy online
Knowledge base
Thesaurus
Compatible with YubiKey
Documentation
Price List
Downloads
Stay up to date with the latest news and updates
Compatible with YubiKey
There are more and more services that support YubiKey keys. You can track new services in our directory and view compatible protocols, browsers, operating systems and settings.
Cybersecurity thesaurus
Every industry has a set of new terms. We try to write in such a way that our instructions or articles are easy and understandable, but sometimes specific concepts cannot be dispensed with. And it doesn’t hurt to understand the types of dangers and means of protection. So we have created for you a page with useful and informative information with a list of basic concepts, which will be constantly updated.
We are on social networks
Subscribe to our social media pages, so you don’t miss out on cybersecurity news, or new products and promotions in our online store.