Want to know how to get the most out of your trial? In this article, I share what I’ve done to succeed when planning, executing, and finishing a proof of concept.
Duo with Meraki makes it easy for organizations to deploy and manage their IT networks, and enable secure access only from verified users and compliant devices.
The Australian Cybersecurity Centre recently released a document outlining its tips and guidelines for securing the remote worker. The advice is timely and well-structured with some timely reminders.
Cash is king and the main motivating factor behind data breaches findings show in 2020's Verizon Data Breach Investigations Report. Join us as we unpack the latest numbers. Hint: Phishing and stolen credentials cause the majority of breaches.
Duo protects Webex logins and prevents unauthorized users from accessing sensitive data stored within Webex.
Now that we are getting into a routine working from home, there is a key social activity that we have to be intentional about. Team celebrations! Now more than ever it is important to recognize and celebrate all of the awesome personal and professional things that are happening on our teams.
This is a tale of a lawsuit following a data breach that stemmed from a disgruntled employee who purposefully leaked his co-workers data. Should the company be responsible? The UK courts made their decision.
Over the past year, we have seen the rapid growth in Microsoft Intune’s adoption particularly for customers who previously were using Active Directory Directory Services or Microsoft SCCM for managing their corporate-issued devices. The Microsoft Intune integration will cover iOS, Android, and Windows devices (8.1 and above) managed by Intune.
Margaret Atwood, author of 'The Handmaid's Tale,' joins Duo Advisory CISO Dave Lewis for the third episode of the Plaintext Podcast.