#WeAreDuo Employee Spotlight with Lisa Rinek
We sat down with Senior Customer Success Manager, Lisa Rinek to learn about what she does and her experience at Duo. #JoinUs
We sat down with Senior Customer Success Manager, Lisa Rinek to learn about what she does and her experience at Duo. #JoinUs
The interactions between Amazon Web Services (AWS) users, services and resources are governed by policies implemented in AWS Identity and Access Management (IAM). Duo Labs is releasing a first-of-its-kind open-source tool which automates the evaluation of IAM policies: Parliament.
Introducing Duo Device Health. It works at the application layer. Duo Device Health application is integrated into the Duo authentication path and protects applications that end users access via the Duo web prompt for two-factor authentication. It works for both cloud/SaaS and on-premise applications.
The "State and Local Cybersecurity Act of 2019 "bill recommends MFA and aims to improve coordination between the Department of Homeland Security (DHS) and state and local governments by creating channels for sharing threat intelligence and resources.
Dear Governor, Mayor, Legislator, County Official, Each day there are more and more stories about ransomware and threats to forthcoming elections. I'm sure it's already on your mind.
Just about every CISO you meet has a scary tale to tell, just as everyone you meet probably has a tale to tell about a horrible accident that happened to them or someone they know. The security ghost stories are fun to tell at conferences. But telling them constantly, at length, doesn’t help us have a reasoned conversation with the business around risk.
Let’s face it, no one uses only one platform and it is great to have options available to address that. We all have third-party applications that we use and having the ability to leverage Microsoft Entra ID with Duo allows for a much wider coverage area than might have been thought possible before.
What is “zero trust” and why should you care? In the past, the security walls or the “perimeter” lived in and around the network. Mobility and globalization have changed that. Users are connecting to the network and applications in a variety of new ways — which has expanded the perimeter to anywhere access happens.