Leveraging Duo Trust Monitor to Detect Push Phishing
MFA is now commonplace enough that folks are beginning to treat it as the wall that’s been around the city for years - some have gotten too used to its protection.
Ted has spent his career accelerating growth at SaaS startups. He has an MBA from Emory University and a Bachelor's Degree in Physics from Bowdoin College. He enjoys fine cheese plates, board games, and watching videos of Richard Feynman explaining the world.
MFA is now commonplace enough that folks are beginning to treat it as the wall that’s been around the city for years - some have gotten too used to its protection.
One piece of feedback we heard time and again was that the risky login events would be more useful if leveraged within a more central security tool. Customers want programmatic access to risky login data. You asked, and we listened.
Dear iFrame, It’s hard to say this, but we need to break up. It’s not you. It’s us. (Well, it is sort of you.) You weren't obtrusive. Most of the time, you just worked. But things have changed.
The Australian Cybersecurity Centre recently released a document outlining its tips and guidelines for securing the remote worker. The advice is timely and well-structured with some timely reminders.
Imagine a world where you would be able to monitor each individual deployment with security analytics. Can you see it? Good news, that world exists today. Duo is the leading multi-factor authentication solution in security and we are excited to announce the public beta of Duo Trust Monitor which will extend these layers of controls into the behavioral realm with security analytics!