Any transformation programme is a great chance to fix the errors of the past and build a more solid way forward for the future. It also enables the business case for security to be aligned with a case for the greater business change.
With Duo, you can protect your Microsoft applications and all of your other applications, reducing your risk surface without managing disparate access security solutions.
Yes, it’s time to really have a serious conversation about election security. I mean for real this time. Voter “systems” are comprised of endpoints, users, data and applications. Sound familiar? Voter systems are enterprise systems. In this post I share with you the 7 ways the government can secure the 2020 elections.
As with many data compliance regulations, achieving ISO 27001 compliance takes time and planning. In this post, we’ll outline how Duo solutions can help you quickly and easily achieve ISO 27001 to ensure your organization is in compliance and stays that way.
You remember the saying "it's the greatest thing since sliced bread?" Before there could be toasted sliced bread there had to be standards. Prior to sliced toasted bread, bread came in all shapes and sizes and electricity was not in every home. The same rule applies to technology innovations like passwordless; we need standards, infrastructure and critical mass.
Based on roles, users can have a lot of sensitive information in their O365 accounts, such as customer names, legal documents, contracts, trade secrets, internal communications, financial information etc. An attacker can find valuable information by compromising just one account’s credentials. We put together a list of the top five ways you can secure your Microsoft O365 accounts, and all of your accounts.
What a big year for passwordless! Since March, the World Wide Web Consortium (W3C) and Fast Identity Online Alliance (FIDO) have come together to declare that Web Authentication (WebAuthn) is now an official global web standard. Learn about the technical aspects of WebAuthn as I guide you in this step-by-step video tutorial.
Organizations are moving to the cloud in order to both modernize their IT environment and reduce their operational costs. As cloud products and services mature, companies feel comfortable moving more and more of their infrastructure into hosted environments. In many cases, this journey is a daunting one. Reduce cloud-anxiety with AWS and Duo's MFA.
When NIST updated SP-800-63 to rev. 3, they did more than just make it okay to have alternatives to PIV/CAC. The forward-thinkers at NIST also envisioned a world where the flexibility extended to federating identities AND proving separation between the authentication and ID-proofing. The future will be modern.
I consider myself very lucky that my role at Duo as an Advisory CISO affords me the ability to see the world. As a result of speaking at conferences and meeting with customers, I get to interact with an international audience. This has given me insight into the shared security problems with which we all must contend.