Connect with Duo users and security professionals in our Community.
Can't find what you're looking for? Contact Sales or Contact Support.
← Back to Index
Reducing the likelihood of a vulnerability being exploited, or lessening its impact after a breach.
Mitigating Credential-Stealing Malware with Two-Factor Authentication
Mitigating Effects of the Hacking Team Fallout
Update to New iOS and OS X Versions to Mitigate iMessage Encryption Flaws
Exploit Mitigations in Android Jelly Bean 4.1
User Access Policies
Ensure Trusted Users as part of a complete Trusted Access solution by using Duo’s contextual user access policies, letting you gain greater control over who can access your applications.
Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e-books, security industry news, all handcrafted by Duo. You may unsubscribe any time.
Thanks for signing up!