Duo MFA for AWS: Secure Your Cloud Journey
Duo & AWS have come together, combing zero trust security & a leader in cloud infrastructure & services. Learn how Duo is making AWS more secure.
Duo & AWS have come together, combing zero trust security & a leader in cloud infrastructure & services. Learn how Duo is making AWS more secure.
Learn about the history of cloud computing and how to secure access to any existing single sign-on (SSO), identity providers and federation service and all of your cloud apps such as Office 365, Google, Box, Dropbox, Slack, and more.
The Raptor’s iconic basketball jersey was, like many things, driven by technological limitations. These are the same design challenges we face in IT security.
Learn about the history of networking and micro-segmentation and how enforcing adaptive policies with granular controls gives orgs zero trust protective superpowers.
Sweeping data privacy laws mirroring EU's GDPR are now making their way to the United States. Shortly after GDPR went into effect, the California legislature passed the California Consumer Privacy Act (CCPA), which mimics many of GDPR’s principles. This law goes into effect on January 1, 2020. We help you prepare.
Not all 2FA solutions are created equal. It’s up to the enterprise to pick the right one. This won’t stop some news outlets from posting headlines like, “Phishing attacks that bypass two-factor authentication are now easier to execute.” Which is misleading.
Learn about zero day hacks and how establishing device trust can thwart them in this third installment of our five-part series, "5 Principles to Achieve Zero Trust for the Workforce."
Duo Security is thrilled to announce that we won the “Best Authentication Technology” award during this year’s SC Awards Europe gala dinner! Hosted by SC Media, SC Awards Europe celebrates the achievements of the cybersecurity professionals and companies throughout Europe who strive to protect and secure businesses, customers, and critical data.
Pull up a chair, and get ready to dig into the changing security landscape. Corporate executives were targeted nine times more for social breaches and C-Level executives (CEO, CFO, CMO etc.) were targeted 12 times more for social incidents according to Verizon's 2019 Data Breach Investigations Report.
Learn about the history of endpoint security, and why the second principle of a zero-trust journey is to gain visibility into devices to secure the workforce in this next part of our five-part blog series.