What To Do if You Must Use SMS
Despite everything we know about the risk of SIM hijacking as a vector of compromise, there’s no way that we can reasonably tell organizations to stop using SMS authentications.
Despite everything we know about the risk of SIM hijacking as a vector of compromise, there’s no way that we can reasonably tell organizations to stop using SMS authentications.
If 2020 proved anything, it proved it is hard to predict the future. In spite of that, our CISO advisor Wolfgang Goerlich has some predictions for cybersecurity in 2021 to share. (Spoiler alert: there is hope!)
The 2020 Duo Trusted Access Report shows a significant increase in year over year growth in remote access and the use of cloud applications. We show you how to secure cloud and remote app access in this article.
The 2020 edition of the Duo Trusted Access Report analyzed over 26 million devices, 500 thousand applications and more than 700 million authentications per month to gain deep insight into user security behaviors and endpoint security. Learn how policy controls can protect devices.
As the cybersecurity industry continues to pivot towards a zero trust model to ensure only trusted access is granted, companies are looking for guidance on how to adopt zero trust principles into their security practices. Use this white paper as a resource on how to implement zero trust.
“Turns out, people aren’t all that good at predictions,” I wrote in my 2020 article. How true this turned out to be. Few could foresee the turns 2020 would take.
Buh bye Flash! Before we send you off to your retirement, we'd like to take a moment to say a few words.
This last 10 months has given security practices the ability to make changes to better democratize security for their employees. We have been able to settle in with a better understanding of how to handle our remote workforce requirements while reducing the risk.
As we put 2020 in our rearview mirror, and look forward to 2021 with dewy-eyed optimism, I want to take a moment to celebrate cybersecurity and anticipate things to come.
Users and industries are moving away from unsafe SMS-based authentication methods, making push the dominant user choice for 2FA (two-factor authentication). Learn why!