One’s life’s purpose should not be merely a means to an end, but rather, the end itself.
Whether you call it BeyondCorp, zero trust, or any other kind of model, the issue of trust is central to how you configure your access policies.
The zero-trust concept starts with establishing a level of trust around the identity of the user and what they can access to work within the organisation’s environment.
There's a new set of rules for companies seeking federal government contract work. NIST published the final SP 800-171A to help companies determine if they're in compliance with requirements for handling controlled unclassified information.
June's Android update patches for over 50 vulnerabilities, 11 rated as critical - but patching isn't always easy or possible.
The NCSC has published a series of guidance notes for U.K. enterprises on methods of mitigating cyber security risks - including multi-factor authentication (MFA).
Duo addresses multi-authentication with a solution characterised by its simplicity in implementation and operation.
Duo now integrates with Sophos to help our mutual customers mitigate their BYOD security risks by making it easier to gain visibility and control over personal vs. corporate mobile devices.
Cloud and mobile technologies have accelerated IT modernization in federal agencies. In this paper, we examine five steps agencies can take to better secure application access and satisfy modernization requirements.
What cloud applications are being targeted by attackers, and why? See the different security risks and how you can prevent attacks when moving to the cloud.
Get a recap of Duo's experience at the 2018 Apple Worldwide Developers Conference, where we learned what’s new with Apple’s major annual OS upgrades and mulled over what these developments mean for Duo and our customers.
How did Duo design our latest data visualizations to bring you better security reports on your users' authentications? Here's the story behind the product design process.
One of our core values at Duo is “Engineer the Business.” Today, we're publishing our Engineering Career Ladder that has allowed Duo software engineers to progress in their career.
Learn about the data-driven, visualization tools and systems that helped make Duo's new authentication and deployment reports possible.
The latest federal agency cybersecurity risk assessment report reveals that 74 percent of agencies are at risk or high risk of a potential security breach.
Don't fall into the expense-in-depth trap - by consolidating security solutions and vendors, you can achieve reduced complexity while balancing usability with security.