Access security and identity have evolved quickly over the years - here’s what to look for in a modern two-factor authentication solution.
We're excited to announce two new open-source tools designed to help administrators prevent, manage, and respond to phishing attacks against their organization - IsThisLegit and Phinn.
NIST has updated their Digital Identity Guidelines, SP 800-63-3 with final security recommendations - see the new standards that many industries, including government agencies and contractors, need to follow.
If you’re heading to Las Vegas for a week of back-to-back conferences, well, we are too. And we’ll be there with a new tool demo, book signing, plus several parties & awesome DJs.
In part 2 of our series, Moving Behind the Perimeter: How to Implement the BeyondCorp Security Model, we walk you through how to build a new enterprise security model within your organization, the different stages involved, and questions to ask along the way.
Saleema Syed, who previously worked in business and sales operations at FireEye and McAfee, shares why she joined the Duo Security team as Director of Business Services.
From stopping the initial point of infection to narrowing its path of destruction, here are some tips from the US-CERT (United States Computer Emergency Readiness Team) to help organizations of all sizes stay safe.