Introducing Duo Restore for personal third-party apps using Duo Mobile. Now users can protect all of their accounts and restore them with one app. In this article we’ll show you how.
Microsoft announced they're dropping password-expiration policies. So if password expiration policies don't actually help, what does? Using multi-factor authentication (MFA).
Due to increasing cybersecurity vulnerabilities the government requires military and federal agencies to dramatically accelerate implementation of multi-factor authentication, especially for privileged users. Duo MFA keeps costs low and works with federal legacy IT systems.
Duo Security's multi-factor authentication (MFA) is compliant for federal government use, approved by the Department of Homeland Security and is listed on the Continuous Diagnostics and Mitigation (CDM) Approved Products List (APL).
This is the third blog in a three-part blog series that walks through the top six areas of concern for CISOs and CIOs and the security solutions available. Let’s dig into the final two top concerns for CISOs: early detection of risks from inside the firewall and managing cloud security.
The idea of a zero-trust approach to security has resurged in the infosec space, and everyone seems to be offering complex models and solutions. But what problems does this approach solve? How can organizations build a zero-trust model, and where should they start?
The federal and military CAC and PIV systems are as ingrained into our systems as the American Social Security number—and are not exactly going away, but they are getting a mobile makeover utilizing multi-factor authentication (MFA) that is seamless and frictionless.
This is the second blog in a three-part blog series that walks through the top six areas of concern for CISOs and CIOs and the security technology solutions available. Let’s dig into the next two top concerns for CISOs: adopting an internal culture of security and aligning security ops with IT ops.
Recently at Duo Tech Talks we hosted Emma Dauterman of Stanford University for an outstanding presentation on True2F, a joint research project between Stanford and Google surrounding backdoor-resistant security keys.
Giving users the incentive to be good security citizens cannot be overstated. Having well defined, user-centric policies and processes coupled with user compassion – especially concerning BYOD and passwords – and great tools make for a winning combination. Otherwise, we are creating accidental incentives to not do the right thing and the law of unintended consequences will prevail.