R.A.D. - My Perspective of RSA 2020
After being immersed in the mayhem that is RSA I often wonder if it is what you miss rather than what you see that is so intriguing. In this post, I will share with you my key takeaways from this year's RSA.
After being immersed in the mayhem that is RSA I often wonder if it is what you miss rather than what you see that is so intriguing. In this post, I will share with you my key takeaways from this year's RSA.
This is the final blog of the 4-part series showcasing how organizations can verify device trust with Duo. In this blog, we will summarize how organizations can easily reduce their exposure to cyber risk with the newly available capabilities that make up Duo Device Trust.
The release of Cybersecurity Maturity Model Certification (CMMC), a third-party audit is required for any contractor responding to DoD bids. CMMC is a game-changer with its concise summary of security controls and a newly found accreditation body. In this post, we will show how Duo helps you get started with CMMC.
The best security control is the security control people actually use. We’ve shifted from enforcing security to creating security that users want to adopt. When it comes to zero trust, one thing many of us have been considering is how to make it attractive to end users. Enter passwordless authentication.
This is the third of a four-part blog series on how Duo helps organizations in verifying device trust. This blog will explain how Duo's Device Trust enables organizations to check and enforce the device security and compliance posture prescribed by standards such as PCI-DSS, HIPAA, and the NIST cybersecurity framework.