My 2020 Predictions Revisited: What Worked, What Didn’t
“Turns out, people aren’t all that good at predictions,” I wrote in my 2020 article. How true this turned out to be. Few could foresee the turns 2020 would take.
“Turns out, people aren’t all that good at predictions,” I wrote in my 2020 article. How true this turned out to be. Few could foresee the turns 2020 would take.
Buh bye Flash! Before we send you off to your retirement, we'd like to take a moment to say a few words.
This last 10 months has given security practices the ability to make changes to better democratize security for their employees. We have been able to settle in with a better understanding of how to handle our remote workforce requirements while reducing the risk.
As we put 2020 in our rearview mirror, and look forward to 2021 with dewy-eyed optimism, I want to take a moment to celebrate cybersecurity and anticipate things to come.
Users and industries are moving away from unsafe SMS-based authentication methods, making push the dominant user choice for 2FA (two-factor authentication). Learn why!
Our goal for this blog post is to take a deeper look into the metrics that we collect and report on, the story they tell, and how they drive quality improvements. We hope that readers can walk away with actionable ideas on metrics that can help keep quality front and center of the software development process.
Alerts you can use. Duo Trust Monitor does the heavy lifting of highlighting recent authentications that deviate from the normal patterns. To maintain a current understanding of those patterns, models are updated on a frequent basis and adapt quickly to new emergent behaviors.
We invite you to learn more about how Duo Security and FEITIAN work together to provide flexible and strong authentication options for organizations of all sizes with a variety of security tokens to fit your needs.
We have been seeing an increased demand for Duo’s Device Trust capabilities (specifically Trusted Endpoints) to extend to ChromeOS users so customers can ensure only corporate-managed Chromebooks can gain access to these productivity applications.
Was your team prepared to move to a virtual work reality? If you said, “not very,” you are not alone. The truth is very few progressive companies transitioned easily, but for the rest remote access security was not the priority. Learn how to secure remote access in our Remote Access Guide 2.0!