Read the original article: #WeAreDuo Employee Spotlight with Glenn Stempeck Have you ever wondered what life at Duo is like? Or what it’s like to be an Engineer, Product Designer, Account Executive etc. at Duo? How current employees landed their…
Tag: The Duo Blog
Strong MFA: The First Stop on the Path to Passwordless
Read the original article: Strong MFA: The First Stop on the Path to Passwordless Passwords, the antiquated security mechanism in place since the 1960’s, have since their inception caused user and administrative frustration due to their complexity and frequent resets.…
7 Observations (I Didn’t Expect) From a WFH World
Read the original article: 7 Observations (I Didn’t Expect) From a WFH World At the time of this post, my team has spent more of 2020 in mandatory WFH (work from home) than in-office. Right away, there were a few…
What I’ve Learned From My SMB Customers
Read the original article: What I’ve Learned From My SMB Customers I’ve been at Duo Security, now part of Cisco, for close to 3 1/2 years. Coming in I had very little knowledge of cybersecurity and what drove the industry,…
Duo Log Sync: Sending Your Duo Logs to Your SIEM
Read the original article: Duo Log Sync: Sending Your Duo Logs to Your SIEM The Problem Data is key for an organization to make any decision. But for data to be effective, it needs to be in a central location,…
What’s the Deal With the CCPA?
Read the original article: What’s the Deal With the CCPA? Imagine Jerry Seinfeld performing his 1990s standup comedy routine in front of a brick wall saying to the audience: “what’s the deal with airline food?” Now, picture Jerry Seinfeld as…
CyberSecure From Home in Canada
Read the original article: CyberSecure From Home in Canada The universally accepted, “Home is where the heart is,” has recently proven itself to be mildly untrue. Any IT security professional currently navigating the ever-changing waters of these times will tell…
Standing in Solidarity: Celebrating Pride This June
Read the original article: Standing in Solidarity: Celebrating Pride This June The celebration has its roots in the 1969 Stonewall riots, where it has been said that Marsha P. Johnson, a black transgender sex worker, threw a single brick that sparked…
This June Marks LGBTQ+ Pride Month 50th Year
Read the original article: This June Marks LGBTQ+ Pride Month 50th Year The celebration has its roots in the 1969 Stonewall riots, where it has been said that Marsha P. Johnson, a black transgender sex worker, threw a single brick that…
New Guide: The Essential Guide to Device Trust in the Enterprise
Read the original article: New Guide: The Essential Guide to Device Trust in the Enterprise Imagine you are a small business owner. Maybe you own a restaurant or accounting practice. You have seasonal employees who need to access your network.…
SSO and the Road to Passwordless
Read the original article: SSO and the Road to Passwordless We’ve all heard the phrase “every journey starts with a single step.” While this might seem obvious on the face of it, we can often feel pressure to immediately arrive…
Upending Old Assumptions in Security
Read the original article: Upending Old Assumptions in Security Every time you think you’ve figured out this risk management thing, something else happens to torpedo your hidden assumptions. Remember when we assumed that an IP address was a pretty good…
Upending Old Assumptions in Security
Read the original article: Upending Old Assumptions in Security Every time you think you’ve figured out this risk management thing, something else happens to torpedo your hidden assumptions. Remember when we assumed that an IP address was a pretty good…
Trials and Transformations: Test Driving Multi-Factor Authentication and Zero Trust Solutions
Read the original article: Trials and Transformations: Test Driving Multi-Factor Authentication and Zero Trust Solutions Does this sound familiar? “It’s just a trial. I have plenty of time. I’ll get to it when I get to it.” I’ve heard these…
Duo With Meraki: A Recipe to Simplify Your IT Network and Secure Access
Read the original article: Duo With Meraki: A Recipe to Simplify Your IT Network and Secure Access Bring your own device (BYOD) and remote work have been steadily gaining popularity among enterprises as they realize the cost and productivity benefits.…
How Duo Maps to Australian Cyber Security Center Remote Worker Guidelines
Read the original article: How Duo Maps to Australian Cyber Security Center Remote Worker Guidelines For years, security professionals have been discussing the diminishing traditional perimeter. The rise of cloud applications, the prevalence of personal devices in the workplace and…
Unpacking 2020’s Verizon DBIR – Human Error and Greed Collide
Read the original article: Unpacking 2020’s Verizon DBIR – Human Error and Greed Collide Pick up your device, and lean into your screen because the numbers are in for the 2020 Verizon Data Breach Investigations Report (DBIR). This year celebrates…
Duo & Webex: Essential Tools for a Remote Workforce
Read the original article: Duo & Webex: Essential Tools for a Remote Workforce According to a report by MIT, 34% of Americans who were previously commuting to work reported that they were working from home by the first week of…
Keep Celebrating: Ideas for Virtual Social Team Building
Read the original article: Keep Celebrating: Ideas for Virtual Social Team Building Now that we are getting into a routine working from home, there is a key social activity that we have to be intentional about. Team celebrations! Now more…
Keep Celebrating: Ideas for Virtual Social Team Building
Read the original article: Keep Celebrating: Ideas for Virtual Social Team Building Now that we getting into a routine working from home, there is a key social activity that we have to be intentional about. Team celebrations! Now more than…
The Story of the Frolicking Insider
Read the original article: The Story of the Frolicking Insider The UK Supreme Court handed down a judgement recently concerning a supermarket company called Morrisons and a group of 9,000 employees who were pursuing a class action lawsuit following a…
Podcast: ‘The Handmaid’s Tale’ Author Margaret Atwood on Plaintext Ep. 3
Read the original article: Podcast: ‘The Handmaid’s Tale’ Author Margaret Atwood on Plaintext Ep. 3 See the video at the blog post. Welcome to episode 3 of the Plaintext Podcast! You read that right, folks. Today I’m not speaking with…
Duo Expands Device Trust to Corporate Devices Managed by Microsoft Intune
Read the original article: Duo Expands Device Trust to Corporate Devices Managed by Microsoft Intune With remote work, BYOD and hybrid app environments becoming the norm, IT teams need to enforce controls for the users and devices that can access…
Security Next – Predictions on New Ways It Might Become Interesting
Read the original article: Security Next – Predictions on New Ways It Might Become Interesting So What Will Some of the Trends Be? 1. Securing remote workers based on a zero-trust model 2. Reassessing how we approach third-party security 3.…
How Duo and Our Technology Partners Enable a Remote Workforce
Read the original article: How Duo and Our Technology Partners Enable a Remote Workforce How do you enable an increasingly remote workforce with confidence? Duo’s security solutions complement any technical environment, and are engineered to verify identity and establish device…
It’s Not Too Late to Get Your Yearly Dose of HIMSS 2020 Virtually!
Read the original article: It’s Not Too Late to Get Your Yearly Dose of HIMSS 2020 Virtually! In light of recent events, the HIMSS 2020 Conference has gone virtual with the new HIMSS20 Digital, happening now through the end of…
What It Is Like to Onboard and Join the Duo Team Remotely
Read the original article: What It Is Like to Onboard and Join the Duo Team Remotely Image It seems like ages ago when social media feeds were laden with “new year, new me” content. The end of 2019 came with…
It’s not too late to get your yearly dose of HIMSS 2020 Virtually!
Read the original article: It’s not too late to get your yearly dose of HIMSS 2020 Virtually! In light of recent events, the HIMSS 2020 Conference has gone virtual with the new HIMSS20 Digital, happening now through the end of…
We Can Protect Democracy and Election Security in One Easy Step
Read the original article: We Can Protect Democracy and Election Security in One Easy Step 2016 was a watershed year for election security where all aspects of our democracy were under attack from all sides. It was a wake-up call.…
New From Duo Labs: Finding Leaky Radio-Frequency Side-Channels
Read the original article: New From Duo Labs: Finding Leaky Radio-Frequency Side-Channels Have you ever listened to a photocopier or a car engine to infer what it’s doing? If so, you already have all the fundamentals you need to study…
New From Duo Labs: Finding Leaky Radio-Frequency Side-Channels
Read the original article: New From Duo Labs: Finding Leaky Radio-Frequency Side-Channels Have you ever listened to a photocopier or a car engine to infer what it’s doing? If so, you already have all the fundamentals you need to study…
Happy 10th Anniversary Duo and Thank You! XOXO
Read the original article: Happy 10th Anniversary Duo and Thank You! XOXO It is hard to believe that Duo is celebrating its 10-year anniversary and it’s also been over a month since I’ve stepped into the Duo office. The more…
Happy 10th Anniversary Duo and Thank You! XOXO
Read the original article: Happy 10th Anniversary Duo and Thank You! XOXO It is hard to believe that Duo is celebrating its 10-year anniversary and it’s also been over a month since I’ve stepped into the Duo office. The more…
What is CMMC? Learn How the Defense Industrial Base Can Easily Meet Cyber Hygiene Standards
Read the original article: What is CMMC? Learn How the Defense Industrial Base Can Easily Meet Cyber Hygiene Standards New Cybersecurity Certification Requirements for Defense Contractors The Department of Defense (DoD) will require the Defense Industrial Base (DIB) —which consists…
EU Privacy Regulation – Is It Such a Bad Thing for a CISO?
Read the complete article: b’EU Privacy Regulation – Is It Such a Bad Thing for a CISO?’ This post doesn’t have text content, please click on the link below to view the original article. Advertise on IT Security News.…
Hello and Welcome Duo Germany!
Read the complete article: b’Hello and Welcome Duo Germany!’ This post doesn’t have text content, please click on the link below to view the original article. Advertise on IT Security News. Read the complete article: b’Hello and Welcome Duo…
Duo Network Gateway – Secure Remote Access Internationally Without Specialist Hardware
More employees are working remotely and using various types of devices, yet they still require access to applications located on-premises and in the cloud. This puts increasing pressure on IT resources and could present security challenges. The Security Challenge of…
Flashback Friday: The Beer Drinker’s Guide to SAML
Flashback Friday: The Beer Drinker’s Guide to SAML Advertise on IT Security News. Read the complete article: Flashback Friday: The Beer Drinker’s Guide to SAML
Remote Teams in Transition
At Duo Labs, we are a remotely-friendly team, but historically the majority of our team has been based out of one Duo office (in Michigan). Over the past year through a series of unrelated charges, the Labs team has coincidentally…
New EBook: The Shifting Perimeter
At Duo, we take security very seriously, and protecting our customers is always first priority. In this ebook you will learn how the perimeter has shifted with the need for users to access the network from anywhere on any device. Securing access from those…
New EBook: The Shifting Perimeter
At Duo, we take security very seriously, and protecting our customers is always first priority. In this ebook you will learn how the perimeter has shifted with the need for users to access the network from anywhere on any device. Securing access from those…
Telework, the New Normal
Remote Worker Policies are Nothing New in Government Policies like TIC 3.0, OMB’s ICAM memo 19-17 and architectures like Zero Trust are the foundation for the federal workforce to be remote. Remote work in the federal space is not a…
CISO Murder Board Podcast Episode 2: Duo’s Advisory CISOs Tackle Timely Topics
Duo’s CISO Advisory team members are legends in their fields. They have seen it all, and they are ready to share their insights with you! If two crows make an attempted murder, then a group of Advisory CISOs surely make…
A Survival Guide for Remote Teams
A Survival Guide for Remote Teams Advertise on IT Security News. Read the complete article: A Survival Guide for Remote Teams
#WeAreDuo Employee Spotlight with Amanda Muela
Have you ever wondered what life at Duo is like? Or what it’s like to be an Engineer, Product Designer, Account Executive etc. at Duo? How current employees landed their jobs or important lessons they’ve learned while working at Duo? …
Scale Quickly: How to Get Up and Running Fast With Duo
Scale Quickly: How to Get Up and Running Fast With Duo Advertise on IT Security News. Read the complete article: Scale Quickly: How to Get Up and Running Fast With Duo
Scale Quickly: How to Get Up and Running Quickly With Duo
Scale Quickly: How to Get Up and Running Quickly With Duo Advertise on IT Security News. Read the complete article: Scale Quickly: How to Get Up and Running Quickly With Duo
New! Duo Labs Security Report on Passwordless, Biometrics and Sensors
As we start seeing passwordless login flows in Windows, Google, and even LastPass, it’s time to take a deeper look into biometrics and the new threat landscape they’ll bring. We’re big fans of passwordless authentication, both because scanning a fingerprint…
New! Duo Labs Security Report on Passwordless, Biometrics and Sensors
As we start seeing passwordless login flows in Windows, Google, and even LastPass, it’s time to take a deeper look into biometrics and the new threat landscape they’ll bring. We’re big fans of passwordless authentication, both because scanning a fingerprint…
#WeAreDuo Employee Spotlight with Ryan Williamson-Cardneau
Have you ever wondered what life at Duo is like? Or what it’s like to be an Engineer, Product Designer, Account Executive etc. at Duo? How current employees landed their jobs or important lessons they’ve learned while working at Duo? …
Staying Secure While Working Remote: One User’s Story
Staying Secure While Working Remote: One User’s Story Advertise on IT Security News. Read the complete article: Staying Secure While Working Remote: One User’s Story
Plaintext Podcast Episode 2: Author Mike Rothman, President of DisruptOps & Securosis
Welcome back to the Plaintext Podcast with your host Dave Lewis, Global Advisory CISO for Duo Security (now part of Cisco). See the video at the blog post. In this installment I have the honour of interviewing a friend who…
Duo-Hosted SSO (Single Sign-on) Public Beta Is Here!
Introducing Duo-Hosted SSO Your users are human and understandably can take security shortcuts like reusing passwords or making them simple and easy to remember. Unfortunately, that can also make it easier for passwords to be compromised. Employees can access those…
The 2020 CISO Benchmark Study: A Single Integrated Platform Can Thwart Alert Fatigue
The CISO Benchmark Study: Securing What’s Now and What’s Next The 6th annual CISO Benchmark Study just dropped and it is chock full of valuable information gathered from 2,800 cybersecurity IT decision makers from 13 countries to deep dive into…
VIDEO: CISO Wendy Nather Reminded Us Why Democratizing Security Matters at RSA
What does it mean to democratize something? : to make (a country or organization) more democratic. formal : to make (something) available to all people : to make it possible for all people to understand (something) What Does It Mean…
5 Steps for European Orgs to Adopt a Zero Trust Security Framework
“To improve is to change; to be perfect is to change often.” — Winston…
NEW PODCAST: Duo’s Advisory CISOs Star in “Murder Board”
See the video at the blog post. Welcome to our inaugural podcast! Our Duo CISO Advisory team members are legends in their fields. They have seen it all, and they are ready to share their insights with you! If two…
The End of the Password… Finally
The End of the Password… Finally Advertise on IT Security News. Read the complete article: The End of the Password… Finally
The End of the Password… Finally
The End of the Password… Finally Advertise on IT Security News. Read the complete article: The End of the Password… Finally
Getting Started Designing Passwordless and Zero Trust
Picture a rumpled yet dapper man walking the streets of 1970s Silicon Valley carrying a heavy briefcase. The man is Bill Moggridge. The briefcase holds computer components: circuit boards, hard drive, floppy drive, a power supply. The question on Moggridge’s…
R.A.D. – My Perspective of RSA 2020
After being immersed in the mayhem that is RSA I often wonder if it is what you miss rather than what you see that is so intriguing. The range of activities and opportunities to listen are immense. The expo floor…
Easily Reduce Your Cyber Risk With Duo Device Trust
Easily Reduce Your Cyber Risk With Duo Device Trust Advertise on IT Security News. Read the complete article: Easily Reduce Your Cyber Risk With Duo Device Trust
Easily Reduce Your Cyber Risk With Duo Device Trust
Easily Reduce Your Cyber Risk With Duo Device Trust Advertise on IT Security News. Read the complete article: Easily Reduce Your Cyber Risk With Duo Device Trust
Getting Started with CMMC: Why Cybersecurity Maturity Levels for Defense Contractors Will Shine in 2020
The struggle is real. How can the US Department of Defense (DoD) reasonably secure data of their supply chain that supports $716B in congressional funds? With over 300,000 companies holding defense contracts, there’s significant risk associated with sizable user groups…
Thinking Strategically About Passwordless
The best security control is the security control people actually use. We’ve shifted from enforcing security to creating security that users want to adopt. When it comes to zero trust, one thing many of us have been considering is how…
Plaintext Podcast Episode 1: Former CISO Thom Langford, CEO of (TL)2 Security
See the video at the blog post. Welcome to the Plaintext Podcast! I’m Dave Lewis, Global Advisory CISO for Duo Security (a Cisco company). This podcast is the natural progression from the awesomeness that is Decipher. See what I did…
How Duo’s Device Trust Enables Organizations to Enforce Endpoint Compliance
This is the third of a four-part blog series on how Duo helps organizations in verifying device trust. This blog will explain how Duo’s Device Trust enables organizations to check and enforce the device security and compliance posture prescribed by…
Learn the Latest in Cybersecurity For Healthcare Industry at HIMSS 2020
It’s time to get your yearly dose of HIMSS conference in Orlando, Florida! Join Duo Security and all your favorite healthcare information and technology professionals from around the world at the Orange County Convention Center for this year’s Healthcare Information…
NEW! Get Behavioral Security Analytics with Duo Trust Monitor (Beta)
Imagine a world where you would be able to monitor each individual deployment with security analytics. Can you see it? Good news, that world exists today. Duo is the leading multi-factor authentication solution in security because it protects customers against credential theft…
New iPhone, Who dis? How to Instantly Restore 2FA Settings
It’s finally that time. You bought yourself that new iPhone with a super mega ultra display and six cameras. The excitement of having the latest tech in your hands only lasts for so long before you are met by an…
VIDEO: We Would Love You to #JoinUs for Chai
See the video at the blog post. Like what you see? We’re hiring! If your mission is collaborating with inspiring teammates, and creating and supporting products that make a difference, we want you! Learn more at duo.com/careers Advertise on IT Security…
VIDEO: Duo <3: Why Our People Love Working at Duo
Duo + Cisco = Disco With the Most Loved Company in Security and the global leader in network technology joining forces, there are more exciting opportunities than ever to be at the forefront of securing the cloud. Our culture is…
#WeAreDuo Employee Spotlight with PMM Amanda Rogerson
Have you ever wondered what life at Duo is like? Or what it’s like to be an Engineer, Product Designer, Account Executive etc. at Duo? How current employees landed their jobs or important lessons they’ve learned while working at Duo? …
How Duo Blocks Vulnerable Endpoints From Accessing Applications
This is the second of a four-part blog series on how Duo helps organizations in verifying device trust. Gartner predicts that, through 2020, 99% of vulnerabilities exploited will continue to be the same ones known for at least one year…
Lessons from Australia’s “OAIC’s Notifiable Data Breach Statistics Report”
In accordance with the Australian Privacy Amendment made in 2017 to the Privacy Act of 1988, the Office of the Australian Information Commissioner (OAIC) reports statistics on cybersecurity incidents and breaches. The data collected establishes a relatively current picture of…
Gain Visibility and Verify Device Trust Across Any Device
Gain Visibility and Verify Device Trust Across Any Device Advertise on IT Security News. Read the complete article: Gain Visibility and Verify Device Trust Across Any Device
Come Meet Duo’s A-Team at RSA 2020!
In line with the 2020 RSA Conference theme, “The Human Element,” here are some of the many human Duo faces you’ll see at booth #1835S. From data scientists and solutions engineers to advisory CISOs and product pros, these Duo folks…
#WeAreDuo Employee Spotlight with Kwame Musonda
Have you ever wondered what life at Duo is like? Or what it’s like to be an Engineer, Product Designer or Account Executive Duo? How current employees landed their jobs or important lessons they’ve learned while working at Duo? We…
NEW REPORT: Customer Chronicles: Securing State and Local Government Agencies with Strong MFA
State and local government agencies’ networks and systems contain mountains of sensitive citizen data – from financial info to social security numbers to voter registrations. This puts them in a unique position and makes them an attractive target for potential…
Minimizing Your Exposure to Windows CVE-2020-0601
Duo has a strong technical partnership with Microsoft and we work closely to provide security solutions to solve challenges that our customers may be facing. As you may be aware, there was recently a critical vulnerability disclosed by Microsoft which…
2FA Use and Awareness Surge
The public’s use and awareness of two-factor authentication (2FA) is on the upswing, according to the latest State of the Auth report released by Duo Labs. The survey revealed that 53% of respondents have used 2FA, representing a 25% jump…
Account Security: One Healthy New Year’s Resolution You Will Need in 2020
It’s January, and the unwanted chore of removing all the decorations and taking down the tree is lingering, while the thought of joining hundreds of others in the lines to return the unwanted gifts is actually making you excited to…
RSA Conference 2020: Explore the Human Element of Security With Duo
Something big is happening in February 2020, and Duo has been hard at work getting ready! We’re not talking about Valentine’s Day, or Presidents’ Day, or even Groundhog Day (though all of those are great, too). No, we’re getting pumped…
NIST Gets Into the Zero Trust Mix
We barely remember who or what came before this precious momentWe are choosing to be here…right now.– Tool (“Parabola”) Several years ago, I remember sitting in the office of a security director at a large government agency. We were discussing…
Part 3: Cisco’s AnyConnect + Duo Trusted Endpoints Feature
This blog post is the third in a three-part series on how “Duo Integrates with Cisco technology.” Catch up on part two on Duo + Cisco’s Firepower Threat Defense, and part one on Duo + Cisco’s VPN and Cloud Applications.…
What’s Next? 2020 Cybersecurity Predictions
What’s Next? 2020 Cybersecurity Predictions Advertise on IT Security News. Read the complete article: What’s Next? 2020 Cybersecurity Predictions