BYOD Risks Obviated by Two-Factor Authentication
BYOD can introduce new security issues. Here are 5 ways your “bad” BYOD habits are rendered irrelevant by two-factor authentication and SSO.
The latest information security news - what's happening now, what's important, why it matters, real-world implications and who it matters to - without any of the overhype.
425 Articles Found
BYOD can introduce new security issues. Here are 5 ways your “bad” BYOD habits are rendered irrelevant by two-factor authentication and SSO.
Here are a few important qualities you should look for in a modern two-factor authentication solution, from cloud services to easy deployment and more.
Within the complexity of the manufacturing industry exist many security threats, including threats to Internet/intranet communications, intellectual property, global supply chain, proprietary business data and more.
> The federally mandated switch from paper records to digital records has the healthcare industry transitioning to the widespread use of electronic health record systems (EHRs), but application security is still a concern.
As we ring in the new year, it’s the perfect time to take a look back at Duo Security’s most notable 2013 milestones. The following blogs chronicle one great year leading the information security industry, from finding fixes for major Android vulnerabilities to attending the top hacker conventions, to signing on a major social media giant, and more - we’d like to give three cheers to our awesome year in 2013, and here’s to many more!