Essential Information Security Controls: Device Inventory
Learn more about the Center for Internet Security’s Security Controls. In this blog, I cover the first control, Inventory of Authorized and Unauthorized Devices in more detail.
Learn more about the Center for Internet Security’s Security Controls. In this blog, I cover the first control, Inventory of Authorized and Unauthorized Devices in more detail.
Here are 14 remarkable founders, hackers, academics, executives, and investors in cybersecurity you should know.
Learn more about Duo’s integration with Intel to bring hardware-free U2F technology to users as a strong method of two-factor authentication.
How Google secured the perimeterless enterprise with BeyondCorp, and how Duo is now offering this new model of security to organizations everywhere.
Duo’s MSP program ended Year 1 with a bang! Now it’s easier for you to generate recurring revenue by offering multi-factor authentication as a service.
In late July, the U.S. National Institute of Standards and Technology (NIST) declared that SMS-based authentication methods will no longer be considered secure.
We think it is critical that your organization take preemptive steps to protecting yourself from unauthorized access. With Duo’s Platform Edition, we make it easy to set a policy to enable this. In a matter of minutes, you can prevent unauthorized access from any location.
Learn about the science of Duo in space, a mission to perform the first Duo Push authentication from high into Earth's atmosphere while streaming live.
In the fourth of a weeklong series about the technology and process behind Duo In Space, Senior Security Researcher Mikhail Davidov reviews the test launch results and refines the payload based on his findings.
In the third of a weeklong series about the technology and process behind Duo In Space, Senior Security Researcher Mikhail Davidov takes us on a tour of the test launch.