Practical Suggestions for EU CISOs From the Authorities
If you worry about a data breach (and who doesn’t?), you might be wondering how a CISO can prepare to face the authorities.
If you worry about a data breach (and who doesn’t?), you might be wondering how a CISO can prepare to face the authorities.
Despite everything we know about the risk of SIM hijacking as a vector of compromise, there’s no way that we can reasonably tell organizations to stop using SMS authentications.
If 2020 proved anything, it proved it is hard to predict the future. In spite of that, our CISO advisor Wolfgang Goerlich has some predictions for cybersecurity in 2021 to share. (Spoiler alert: there is hope!)
The 2020 Duo Trusted Access Report shows a significant increase in year over year growth in remote access and the use of cloud applications. We show you how to secure cloud and remote app access in this article.
The 2020 edition of the Duo Trusted Access Report analyzed over 26 million devices, 500 thousand applications and more than 700 million authentications per month to gain deep insight into user security behaviors and endpoint security. Learn how policy controls can protect devices.