The idea of a zero-trust approach to security has resurged in the infosec space, and everyone seems to be offering complex models and solutions. But what problems does this approach solve? How can organizations build a zero-trust model, and where should they start?
The Federal CAC and PIV systems are as ingrained into our federal systems as the American social security number—and are not exactly going away, but they are getting an Avengers makeover and being reimagined from the from clunky hardware and ugly UI to modern mobile user credentialing utilizing multi-factor authentication (MFA) that is seamless and frictionless.
This is the second blog in a three-part blog series that walks through the top six areas of concern for CISOs and CIOs and the security technology solutions available. Let’s dig into the next two top concerns for CISOs: adopting an internal culture of security and aligning security ops with IT ops.
Recently at Duo Tech Talks we hosted Emma Dauterman of Stanford University for an outstanding presentation on True2F, a joint research project between Stanford and Google surrounding backdoor-resistant security keys.
This is the first blog in a three-part blog series that walks through the top six areas of concern for CISOs and CIOs and the security solutions available. Let’s dig into the first two top concerns: gaining clear visibility into potential network threats and adopting a zero-trust security policy.
Today, technological advancements in cloud security have turned the tables, and the pros for permitting BYOD devices (laptops, smart devices, phones, tablets, device screens and more) in federal agencies can outweigh the cons.
In some of the very first conversations about the company that would become Duo, two notions kept coming up: 1) The security industry was creating unnecessarily complex products. 2) The industry itself had an image problem. Duo’s brand - its very philosophy - aims to dispel and disrupt those notions.
This year some of our best and brightest teammates were recognized by their security peers for their contributions and achievements to the security industry at the 2019 RSA Conference.
Here we dive in to the basics of secure single sign-on (SSO): how it works, the benefits of using it, and how you can begin the process of deploying SSO.
For federal agencies, compliance laws, policies and standards are often so confusing that they use specialized consultants to determine whether a desired IT initiative will result in compliance issues. Here, we’ll help you cut through the confusion and outline some of the key compliance regulations federal agencies must follow.