This is the second blog in a three-part blog series that walks through the top six areas of concern for CISOs and CIOs and the security technology solutions available. Let’s dig into the next two top concerns for CISOs: adopting an internal culture of security and aligning security ops with IT ops.
Recently at Duo Tech Talks we hosted Emma Dauterman of Stanford University for an outstanding presentation on True2F, a joint research project between Stanford and Google surrounding backdoor-resistant security keys.
This is the first blog in a three-part blog series that walks through the top six areas of concern for CISOs and CIOs and the security solutions available. Let’s dig into the first two top concerns: gaining clear visibility into potential network threats and adopting a zero-trust security policy.
Today, technological advancements in cloud security have turned the tables, and the pros for permitting BYOD devices (laptops, smart devices, phones, tablets, device screens and more) in federal agencies can outweigh the cons.
In some of the very first conversations about the company that would become Duo, two notions kept coming up: 1) The security industry was creating unnecessarily complex products. 2) The industry itself had an image problem. Duo’s brand - its very philosophy - aims to dispel and disrupt those notions.
This year some of our best and brightest teammates were recognized by their security peers for their contributions and achievements to the security industry at the 2019 RSA Conference.
Here we dive in to the basics of secure single sign-on (SSO): how it works, the benefits of using it, and how you can begin the process of deploying SSO.
For federal agencies, compliance laws, policies and standards are often so confusing that they use specialized consultants to determine whether a desired IT initiative will result in compliance issues. Here, we’ll help you cut through the confusion and outline some of the key compliance regulations federal agencies must follow.
Web security has moved from the Captain America approach — using one shield for self-defense: a password — to the Batman approach, where a utility belt of tools contains options for a variety of situations. One of the most important resources in that utility belt is two-factor authentication (2FA).
It would be pretty cool if we had a framework available to us that validated a user’s identity, validated the machine they were using, and applied some policy and context for everything they tried to access. A model that would move the perimeter to anywhere an access decision is made. Oh, wait, we do. It’s often referred to as zero trust.