Second-Guessing the CISO in an Emergency
Don’t do it. Wendy Nather shows an example of the kinds of constraints that organizations have to work with, and why they may make decisions that you don’t understand from the outside.
Don’t do it. Wendy Nather shows an example of the kinds of constraints that organizations have to work with, and why they may make decisions that you don’t understand from the outside.
We are proud to announce the Duo has achieved ISO 27001:2013, 27017:2015, and 27018:2019 ISO certification!
If you worry about a data breach (and who doesn’t?), you might be wondering how a CISO can prepare to face the authorities.
Despite everything we know about the risk of SIM hijacking as a vector of compromise, there’s no way that we can reasonably tell organizations to stop using SMS authentications.
If 2020 proved anything, it proved it is hard to predict the future. In spite of that, our CISO advisor Wolfgang Goerlich has some predictions for cybersecurity in 2021 to share. (Spoiler alert: there is hope!)