Second-Guessing the CISO in an Emergency
Don’t do it. Wendy Nather shows an example of the kinds of constraints that organizations have to work with, and why they may make decisions that you don’t understand from the outside.
34 Articles Found
Don’t do it. Wendy Nather shows an example of the kinds of constraints that organizations have to work with, and why they may make decisions that you don’t understand from the outside.
The journey to a passwordless future begins with single sign-on, or SSO, which allows us to dramatically reduce our reliance on passwords. This is the state of authentication where disparate mechanisms coalesce to provide unified access control.
How has cybersecurity progressed in 2019? Our CISO advisor Dave Lewis reflects on the past year as he lingers over a cup of coffee.
Here at Duo, we think about authentication a lot. We’re constantly on the lookout for new techniques and technologies that will make it easier for users to authenticate, more difficult for attackers to impersonate a user, or both at once. WebAuthn is a great example of this. But in this article, we’d like to avoid focusing on bad auth, and instead focus on uncertain auth. We evaluate all the latest auth methods and their pros and cons.
Selfies kill more people than sharks. This fact doesn’t make sense. Sharks are terrifying. People aren’t all that good at making risk-based decisions. When security leaders seek support for controls, our human nature can become a stumbling block.