In our first blog post introducing the BeyondCorp concept, we discussed what organizations should think about when trying it for themselves. In this post, we’ll talk about creating access policies.
Learn more about the Center for Internet Security’s Security Controls. In this blog, I cover the first control, Inventory of Authorized and Unauthorized Devices in more detail.
We are three months into the new year, but it’s never a bad idea to look back at 2016 and take stock of what happened. Google’s Android Security 2016 Year in Review makes it pretty easy to do so.
Today, Duo signed a joint letter in response to the Department of Commerce’s Green Paper, "Fostering the Advancement of the Internet of Things" to support cybersecurity policy in the Internet of Things (IoT) industry.
In honor of Women’s History Month, here are the wise words of a few making history at Duo...
BeyondCorp: If You Liked It, You Should Have Put a Cert On It Industry News / Featured Article
In this blog post, Wendy discusses how you can mark trusted devices with certificates in your organization as part of the BeyondCorp security model.
Ian P. Sharpe, previously a Security Engineer at Salesforce and Workday, shares why he joined the Duo Security team as Product Marketing Manager.
To help raise awareness about gender disparity in infosec and honor those pushing ahead in the field, Duo’s Women in Security Awards have been awarded to two winners in the industry and academia - here’s their stories.
In October 2016, the Department of Defense (DoD) issued a final rule that requires contractors to implement information security guidelines no later than December 31, 2017.
Unpatched devices are vulnerable devices. Duo Labs analyzed our exclusive endpoint data to reveal iOS 10 user update findings and offer you tips on securing your devices.
One of the most common challenges we hear from the Managed Service Provider (MSP) community today is the requirement to deliver more with less.
Duo’s mobile engineer details how he updated the Duo Swift API to Swift 3.
Some of the biggest challenges in information security for the healthcare industry include EHR complexity, interoperability, dependencies and more.