The industry is leading the way on zero trust and the government has to figure out how to fly the plane while building it. Typically, not an easy proposition.
Visually mapping social network connections reveals patterns that may otherwise be hidden in the data. Plus, these graphs serve as compelling pieces of generated artwork. This post shows the step-by-step process to create a graph of your own social network using Gephi.
UK CISO Survey Reveals Concerns About Shadow Devices Industry News / Featured Article
A Duo survey of 100 UK-based chief information security officers (CISOs) and senior information security leaders revealed their concerns about shadow devices - or, employee-owned personal devices connecting to work networks.
An overview of the development process of bringing a customer's feature request to life - now help desk admins can verify the identity of a user that calls in to reset their password, with Duo Push.
Planned to launch in October, Duo with WinLogon Offline extends offline MFA capability to laptops, desktops and servers.