Profile

Cover photo
1,475 followers|367,174 views
AboutPostsPhotosYouTube

Stream

 
Voting for the RSA Conference Crowd Sourced Speaking Sessions is LIVE!!! Help us bring our session higher by voting for our CEO, Stina Ehrensvard’s session! Just follow the link and press the Thumbs Up! “Security Beyond Passwords - Flipping Authentication on its Head” 
5
Add a comment...

Yubico

Shared publicly  - 
 
Yubico engineer Alessio confirming ruggedness of YubiKeys in ocean depths at our "secret underwater testing facility" 
15
3
Marquise Richardson's profile photoYalaxânver Juvoguim's profile photoSr Kraken's profile photoLutz Lutterbeck's profile photo
5 comments
 
+Andrew Jorgensen​ I wasn't even using it at the time I had it in my pocket I pulled it out and noticed the plastic around the contacts had broken and the metal contact had been bent.

I have another blue key and quite a few other ones and haven't had this issue so I'm assuming that one was just a one in a million defect. 
Add a comment...

Yubico

Shared publicly  - 
 
Wireless has become the de-facto connecting point for consumers today and even among enterprises, where employees expect to leave behind desktop Ethernet connections for wireless connectivity in board rooms, conference rooms and common areas.  

And strong authentication is moving in the same direction so as to avoid being limited to a hard-wired port to accommodate its security benefits. 
3
Add a comment...

Yubico

Shared publicly  - 
 
Netherlands-based healthcare provider ZorgSaam taps YubiKeys to secure log-ins originating from outside their network. 
The YubiKey passed all of ZorgSaam’s testing to become the default means for strong authentication.
7
1
Andrew Schott's profile photo
Add a comment...

Yubico

Shared publicly  - 
 
In Part 2, we got a better understanding of what an algorithm like RSA does and what the length of a key entails.  

Now, in Part 3, we can talk about the elephant in the room. Are 2048-bit keys useless? And are your documents completely insecure if you are using them? What are the pros and cons of one key length versus the other? 
14
2
Eero Saarnivaara's profile photoBrandon Mercer's profile photoChristoffer Lilja's profile photoDoorToDoorGeek “Stephen McLaughlin”'s profile photo
2 comments
 
If I had to argue the case for using crypto or not, it's a simple argument. The opinions of people who work on cryptography differ a bit, but there are common areas where they agree. The wide disagreements happen from the folks who consume and implement these crypto solutions. What is boils down to is choice and the ability to migrate away from things when the need arises. If your hardware cannot support ECC implementations that's a limiting factor. Some people work in areas where it's not an issue, others will require ECC. I'd love to see yubikey push the envelope even further by having the capability to use whatever you need to. GPG has been discarded by some, and what will replace it? The hardware that yubico creates should be accommodating to that. 
Add a comment...

Yubico

Shared publicly  - 
 
Does key size really matter in cryptography? Read our first blog in a series of three discussing the YubiKey and Cryptography. More to come! 
12
Brandon Mercer's profile photo
 
It certainly does! It also matters what you do with your keys! Have a look at this. If yubikeys supported this, we'd be worlds ahead of PGP. Public key encryption, OTP, shared key and signing. All in a key that I can print in my business card and someone could actually look at and validate.  https://github.com/tedu/reop/
Add a comment...
Have them in circles
1,475 people
Frederik Hjorslev Poulsen's profile photo
Ryan O'Mara's profile photo
Rob Stets's profile photo
Charles Haris's profile photo
Yugui Sonoda's profile photo
Matthew Davis's profile photo
Laszlo Bertalan's profile photo
Liam Tidwell's profile photo
Matthew Morvelle's profile photo

Communities

Yubico

Shared publicly  - 
 
Just announced today!!!  The YubiKing Virtual Hackathon!! YubiKing is your opportunity to create the next innovative use for a YubiKey. Enter your project in the #YubiKing contest to become eligible to win great prizes! Detail and rules below.  http://ow.ly/KHn52
6
1
Gábor Jakab's profile photo
Add a comment...

Yubico

Shared publicly  - 
 
Queue the Imperial March… Dun Dun Dun Dun Dun-Dun Dun Dun-Dun… (Thanks Thomas B. for the pic!) 
17
Steven Brockwell's profile photo
 
This isn't the password you're looking for.
Add a comment...

Yubico

Shared publicly  - 
 
Yubico's Henrik Stråth and Dain Nilsson presenting on Two-Factor Authentication with FIDO U2F at the MeraKrypto community MeetUp yesterday evening.  Thank you to all who attended!
4
Add a comment...

Yubico

Shared publicly  - 
 
Seven ways to use a single #YubiKey to meet your authentication needs. Our blog explains. How many ways do you know?  
16
2
Guido Grune's profile photoGavin Spurgeon's profile photo
Add a comment...

Yubico

Shared publicly  - 
 
In Part 1 of our crypto blog, we briefly introduced the concept of asymmetric encryption algorithms and the general rule that the longer the key the better. Let’s take a deeper look at that logic here in Part 2 - Comparing Asymmetric Encryption Algorithms.
7
1
Brandon Mercer's profile photoRainer Molitor's profile photo
 
You should also compare some of the things mentioned here: http://nacl.cr.yp.to/index.html
Add a comment...

Yubico

Shared publicly  - 
 
Read our latest newsletter! YubiNews from Yubico - Our events, a Hollywood appearance, Job openings, the YubiKing contest, a FIDO update, meeting the President, and more. 

and be sure to sign up for our next newsletter! 
2
Add a comment...
People
Have them in circles
1,475 people
Frederik Hjorslev Poulsen's profile photo
Ryan O'Mara's profile photo
Rob Stets's profile photo
Charles Haris's profile photo
Yugui Sonoda's profile photo
Matthew Davis's profile photo
Laszlo Bertalan's profile photo
Liam Tidwell's profile photo
Matthew Morvelle's profile photo
Communities
Links
YouTube
Story
Tagline
The key to the cloud
Introduction
As the inventors of the YubiKey®, Yubico sets new world standards for secure login across the Internet. Our unique USB and NFC key offers one-touch strong authentication supporting multiple authentication protocols for all devices and platforms – with no driver or client software needed. With successful enterprise deployments in 140 countries, including 7 of the top 10 Internet companies, Yubico is adding the consumer market to its list of strong authentication converts. Founded in 2007, Yubico is privately held with offices in Palo Alto, Calif., Stockholm, and London.
Contact Information
Contact info
Email