Read the original article: Celebrazione! AgID Certification To Provide Cloud Services in Italy As mentioned in our recent ISO 27000 series certification blog – achieving this global standard for information security has provided us with the opportunity to pursue more…
Category: The Duo Blog
(VIDEO) Getting Started With Duo – Step 4: Setting Up an Application
Read the original article: (VIDEO) Getting Started With Duo – Step 4: Setting Up an Application Welcome to our 5-part video series on getting started with Duo! We have created myriad resources that make it easy to get started with…
Plaintext Podcast Ep. 5 Featuring Bugcrowd Founder Casey Ellis
Read the original article: Plaintext Podcast Ep. 5 Featuring Bugcrowd Founder Casey Ellis Welcome back to the Plaintext Podcast with your host Dave Lewis, Global Advisory CISO for Duo Security, now part of Cisco. In this first episode of 2021,…
Passwordless Authentication, This is the Way
Read the original article: Passwordless Authentication, This is the Way Security leaders the world over tend to share many, if not all, of the same issues in their respective organizations. From having to deal with patching, firewalls, network zone segmentation…
(VIDEO) Getting Started With Duo – Step 3: Admin Dashboard & Device Insight
Read the original article: (VIDEO) Getting Started With Duo – Step 3: Admin Dashboard & Device Insight Welcome to our 5-part video series on getting started with Duo! We believe that cybersecurity should be simple and that applies to seeing…
The CARES Grant: Don’t Leave Money on the Table
Read the original article: The CARES Grant: Don’t Leave Money on the Table Security leaders are always on the lookout for funding sources to support their security programs. Often, security budgets are constrained to an unacceptable degree — and getting…
Secure Access to Your Google Chrome Enterprise With Duo
Read the original article: Secure Access to Your Google Chrome Enterprise With Duo In 2020, according to a report by IDC, Chrome OS became the second most popular choice of operating system in terms of number of devices sold. The…
Duo’s Object Oriented UX (OOUX) Design Process
Read the original article: Duo’s Object Oriented UX (OOUX) Design Process The number one enemy of security is complexity. This is a value we hold true at Duo during our product development process. Yet, we know that complexity is a…
(VIDEO) Getting Started With Duo – Step 2: Enrollment & Self-Remediation
Read the original article: (VIDEO) Getting Started With Duo – Step 2: Enrollment & Self-Remediation Welcome to our 5-part video series on getting started with Duo! Our founders Dug Song and Jon Oberheide believe that security should be elegant, seamless…
Passwordless Authentication – Going Beyond the Hype With 3 Key Considerations
Read the original article: Passwordless Authentication – Going Beyond the Hype With 3 Key Considerations There’s no denying that passwordless is a hot topic. And rightly so, no one likes passwords – users have too many to remember and manage,…
The Zero Trust Approach to Important Control Planes
Read the original article: The Zero Trust Approach to Important Control Planes Although zero trust as a concept has been around for over 10 years, it is only recently that it has been recognized and accepted as a leading strategy…
The Zero-Trust Approach to Important Control Planes
Read the original article: The Zero-Trust Approach to Important Control Planes Although zero trust as a concept has been around for over 10 years, it is only recently that it has been recognized and accepted as a leading strategy for…
Passwordless Authentication – Going Beyond the Hype With 3 Key Considerations
Read the original article: Passwordless Authentication – Going Beyond the Hype With 3 Key Considerations There’s no denying that passwordless is a hot topic. And rightly so, no one likes passwords – users have too many to remember and manage,…
(VIDEO) Getting Started With Duo – Step 1: Authentication Methods
Read the original article: (VIDEO) Getting Started With Duo – Step 1: Authentication Methods Duo’s two-factor authentication (2FA)/multi-factor authentication (MFA) offers several methods through which users can verify their identity before being granted access to applications. Those methods include push notifications,…
How a Popular Company Could’ve Prevented a Phishing Attack
Read the original article: How a Popular Company Could’ve Prevented a Phishing Attack The first known mention of the word “phishing” happened in the America Online (AOL) user group named appropriately “AOHell.” Phishing has raised hell ever since. As technology…
Celebrating Black Pioneers of Technology
Read the original article: Celebrating Black Pioneers of Technology We are celebrating Black History Month (BHM) all month long on Instagram! Join us and follow along as we post trivia, videos and intriguing facts to celebrate Black History Month. Like this…
Hello, I am CISO Helen. Nice To Meet You :-)
Read the original article: Hello, I am CISO Helen. Nice To Meet You 🙂 Hello, I am Helen Patton, and I am the newest Advisory CISO at Duo. It may just be coincidence that 2021 is the year in which…
Zero Trust Meets OS Patch Management
Read the original article: Zero Trust Meets OS Patch Management We are always facing new vulnerabilities in our software, especially in operating systems in the EU and worldwide. Apple issued a security update release for iOS 14.4 recently, as a…
Celebrating Black History Month on Insta
Read the original article: Celebrating Black History Month on Insta It has been a year for change and social justice. At Duo we care a lot about these things. In fact, did you know Duo has an Instagram account? We…
How To Secure Remote Access Right Now
Read the original article: How To Secure Remote Access Right Now Times have changed and the need to provide secure remote access has gone from a nice to have perk for a few remote workers to an all encompassing need…
Second-Guessing the CISO in an Emergency
Read the original article: Second-Guessing the CISO in an Emergency Don’t do it. Look, I know it’s personally gratifying, but just don’t do it. It’s easy to look at what appears to be a badly secured situation and say, “Why…
In Search of… ISO 27001:2013, 27017:27017 & 27018:2019 Certification
Read the original article: In Search of… ISO 27001:2013, 27017:27017 & 27018:2019 Certification We are proud to announce the Duo has achieved ISO 27001:2013, 27017:2015, and 27018:2019 certification! Ever wondered how a screw manufactured in the United States has the…
In Search of… ISO 27001:2013, 27017:27017 & 27018:2019 Certification
Read the original article: In Search of… ISO 27001:2013, 27017:27017 & 27018:2019 Certification We are proud to announce the Duo has achieved ISO 27001:2013, 27017:2015, and 27018:2019 certification! Ever wondered how a screw manufactured in the United States has the…
Practical Suggestions for EU CISOs From the Authorities
Read the original article: Practical Suggestions for EU CISOs From the Authorities If you worry about a data breach (and who doesn’t?), you might be wondering how a CISO can prepare to face the authorities. Privacy and data breaches go…
What To Do if You Must Use SMS
Read the original article: What To Do if You Must Use SMS There are many known risks in life that you simply can’t get rid of altogether. Despite everything we know about the risk of SIM hijacking as a vector…
What To Do if You Must Use SMS
Read the original article: What To Do if You Must Use SMS There are many known risks in life that you simply can’t get rid of altogether. Despite everything we know about the risk of SIM hijacking as a vector…
Future Forward: Cybersecurity 2021 Predictions
Read the original article: Future Forward: Cybersecurity 2021 Predictions It’s 2021. Where is my encryption-breaking dolphin? I admit it. I watched Johnny Mnemonic. It is set in 2021, after all. I wager, there was no better way to prepare for…
Cloud and Remote App Access Climbs Skyward
Read the original article: Cloud and Remote App Access Climbs Skyward The 2020 Duo Trusted Access Report shows a significant increase in year over year growth in remote access and the use of cloud applications. Cloud applications are more flexible,…
How Are Companies Using Device Policies to Thwart Cyber Threats?
Read the original article: How Are Companies Using Device Policies to Thwart Cyber Threats? Companies used to rely solely on corporate networks, MDM (mobile device management) and VPNs blocking unrecognized devices as key cybersecurity protection measures. According to the 2020…
A 5-Step Guide to Implementing Zero Trust in the Workforce
Read the original article: A 5-Step Guide to Implementing Zero Trust in the Workforce As the cybersecurity industry continues to pivot towards a zero trust model to ensure only trusted access is granted, companies are looking for guidance on how…
My 2020 Predictions Revisited: What Worked, What Didn’t
Read the original article: My 2020 Predictions Revisited: What Worked, What Didn’t “Turns out, people aren’t all that good at predictions,” I wrote in my 2020 article. How true this turned out to be. Few could foresee the turns 2020…
Farewell Flash, Forevermore
Read the original article: Farewell Flash, Forevermore Dear Flash, You helped us get our coding legs with Dreamweaver on sites like MySpace and the early web, but you were easily overtaken and hackable. The security and performance holes in your…
Cybersecurity Things to Celebrate in 2020
Read the original article: Cybersecurity Things to Celebrate in 2020 As another calendar year comes to a close it is a time for reflection on the year past and predictions for the year to come. I think we can all…
Why Are More Industries Switching From SMS 2FA to Push?
Read the original article: Why Are More Industries Switching From SMS 2FA to Push? Users and industries are moving away from unsafe SMS-based authentication methods, according to Duo’s hot of the press 2020 Duo Trusted Access Report. And Push continues…
Quality-Driven Engineering: How We Use Metrics at Duo to Drive Continuous Improvement
Read the original article: Quality-Driven Engineering: How We Use Metrics at Duo to Drive Continuous Improvement Introduction: In a fast-paced agile environment where new products and features are being developed and released to customers on a sprint by sprint basis,…
Quality-Driven Engineering: How We Use Metrics at Duo to Drive Continuous Improvement
Read the original article: Quality-Driven Engineering: How We Use Metrics at Duo to Drive Continuous Improvement Introduction: In a fast-paced agile environment where new products and features are being developed and released to customers on a sprint by sprint basis,…
Duo Trust Monitor Is Here to Make Risk Detection Easy
Read the original article: Duo Trust Monitor Is Here to Make Risk Detection Easy Duo is excited to announce that our machine learning powered Trust Monitor feature is now available for all Duo Access and Beyond customers at no additional…
FEITIAN + Duo Integration Supports the Broadest Range of MFA Options
Read the original article: FEITIAN + Duo Integration Supports the Broadest Range of MFA Options Users have left the building, and it’s up to your security team to make sure they are protected on any device, wherever and whenever they…
Google Chromebooks & Duo — Powering Remote Workforce Security
Read the original article: Google Chromebooks & Duo — Powering Remote Workforce Security Securing Your Remote Workforce In the sea of changes we have all witnessed in 2020, the one around remote work is one that seems like it is…
The Remote Access Guide 2.0 — A Reality Check
Read the original article: The Remote Access Guide 2.0 — A Reality Check How Prepared Were You for the Shift to Mostly Remote Access? Quick, where were you when you found out you had to work from home? I remember…
The Remote Access Guide 3.0 — A Reality Check
Read the original article: The Remote Access Guide 3.0 — A Reality Check How Prepared Were You for the Shift to Mostly Remote Access? Quick, where were you when you found out you had to work from home? I remember…
Make It Your Own: Brand Customization With Our Universal Prompt
Read the original article: Make It Your Own: Brand Customization With Our Universal Prompt In the security industry there is an adage that usability needs to be sacrificed in the name of increasing security. The equation has traditionally been zero…
New 2020 Duo Trusted Access Report Examines Securing Remote Work
Read the original article: New 2020 Duo Trusted Access Report Examines Securing Remote Work The time has come where we analyze authentication data and produce our wildly popular Duo Trusted Access Report. The 2020 Duo Trusted Access Report details the…
New 2020 Duo Trusted Access Report Examines Securing Remote Work
Read the original article: New 2020 Duo Trusted Access Report Examines Securing Remote Work The time has come where we analyze authentication data and produce our wildly popular Duo Trusted Access Report. The 2020 Duo Trusted Access Report details the…
Duo Security and Datto: More Than Just Another MSP Integration
Read the original article: Duo Security and Datto: More Than Just Another MSP Integration Let’s face it, these days the information we keep online is too important to safeguard with a username and password — especially with target credential attacks…
#WeAreDuo Employee Spotlight with Swetha Amruthur
Read the original article: #WeAreDuo Employee Spotlight with Swetha Amruthur Swetha Amruthur Have you ever wondered what life at Duo is like? Or what it’s like to be an Engineer, Product Designer or Account Executive Duo? How current employees landed…
The View Up Here Is Great – Introducing Our New Cloud-Based SSO
Read the original article: The View Up Here Is Great – Introducing Our New Cloud-Based SSO Announcing the General Availability of Duo’s new SSO and Duo Central! Over the last few years we’ve seen our customers move increasingly more on-premises…
When the EMEA Duo Partner Kick-Off Goes Virtual
Read the original article: When the EMEA Duo Partner Kick-Off Goes Virtual It’s 2019, we have just finished the last group karaoke sing-a-long to Toto’s “Africa” and said farewell to all of our amazing partners that attended our last partner…
Plaintext Podcast Ep. 4 Featuring Akamai CSO Andy Ellis
Read the original article: Plaintext Podcast Ep. 4 Featuring Akamai CSO Andy Ellis Welcome back to the Plaintext Podcast with your host Dave Lewis, Global Advisory CISO for Duo Security, now part of Cisco. In this installment, I have the…
A Truly Universal Prompt: Accessibility for All
Read the original article: A Truly Universal Prompt: Accessibility for All At Duo we like to make the right thing to do, the easy thing to do. Duo recently announced that we’re simplifying our multi-factor authentication experience by building our…
The Student’s Guide to Two-Factor Authentication (2FA)
Read the original article: The Student’s Guide to Two-Factor Authentication (2FA) Students all over the world are required to use Duo two-factor authentication (2FA)… and they hate it. You might be one of them. They hate it because their phone…
#WeAreDuo Employee Spotlight with Jordan Wray
Read the original article: #WeAreDuo Employee Spotlight with Jordan Wray Jordan Wray Have you ever wondered what life at Duo is like? Or what it’s like to be an Engineer, Product Designer or Account Executive Duo? How current employees landed…
The Multi-Factor Factor (or How to Manage Authentication Risk)
Read the original article: The Multi-Factor Factor (or How to Manage Authentication Risk) As we debate the necessity of various authentication factors, particularly for passwordless projects, it’s good to take a step back and remember how we got here. There…
My Journey from Engineer to AppSec
Read the original article: My Journey from Engineer to AppSec How Did You Make a Career Change? I can remember the first time I got into programming. My family got an Apple IIe and I taught myself BASIC so I…
Clear & Simple: Monitoring Access with Duo Trust Monitor
Read the original article: Clear & Simple: Monitoring Access with Duo Trust Monitor Trust is a fickle thing. Some people in life assume that trust should be implicit – that you can trust others based on little more than intuition,…
How 2FA Can Help Tesla Cars Stay Secure
Read the original article: How 2FA Can Help Tesla Cars Stay Secure There is no denying that the era of electric vehicles is upon us. These vehicles become evermore capable with new features and improvements being delivered via over the…
WEBINAR: 4 Election Security Educators Walk Into a Panel
Read the original article: WEBINAR: 4 Election Security Educators Walk Into a Panel What happens when four election security specialists gather together to talk shop? They dispel myths, share deep knowledge, and bring clarity to the state of our elections.…
How to Secure Your Amazon Account With Duo 2FA
Read the original article: How to Secure Your Amazon Account With Duo 2FA Secure Your Amazon Account You have upped your Amazon game and find that you are ordering more and more things online from groceries to gifts, when suddenly…
The Student’s Guide to Two-Factor Authentication (2FA)
Read the original article: The Student’s Guide to Two-Factor Authentication (2FA) Students all over the world are required to use Duo’s two-factor authentication (2FA)… and they hate it. You might be one of them. They hate it because their phone…
How to Secure Your Amazon Account With Duo 2FA
Read the original article: How to Secure Your Amazon Account With Duo 2FA Secure Your Amazon Account You have upped your Amazon game and find that you are ordering more and more things online from groceries to gifts, when suddenly…
Duo Central: Securely Access All of Your Cloud Applications
Read the original article: Duo Central: Securely Access All of Your Cloud Applications Less Effort = A Single Dashboard For Apps I am guessing most people have experienced that feeling of excitement when you finally decide to press buy for…
Duo Central: Securely Access All of Your Cloud Applications
Read the original article: Duo Central: Securely Access All of Your Cloud Applications Less Effort = A Single Dashboard For Apps I am guessing most people have experienced that feeling of excitement when you finally decide to press buy for…
Cisco Rides the Wave of Zero Trust and Is Named a Leader
Read the original article: Cisco Rides the Wave of Zero Trust and Is Named a Leader “Cisco pushes the Zero Trust envelope the right way” — The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers Q3, 2020 Back in 2010,…
#WeAreDuo Employee Spotlight with Laura O’Melia
Read the original article: #WeAreDuo Employee Spotlight with Laura O’Melia Have you ever wondered what life at Duo is like? Or what it’s like to be an Engineer, Product Designer, Account Executive etc. at Duo? How current employees landed their…
#WeAreDuo Employee Spotlight with Laura O’Melia
Read the original article: #WeAreDuo Employee Spotlight with Laura O’Melia Have you ever wondered what life at Duo is like? Or what it’s like to be an Engineer, Product Designer, Account Executive etc. at Duo? How current employees landed their…
Rolling Out Duo in EMEAR – Answers to the Top 3 Customer Questions
Read the original article: Rolling Out Duo in EMEAR – Answers to the Top 3 Customer Questions In Customer Success, we help customers get the most from Duo, which means getting to security fast, integrating Duo with all sorts of…
How to Secure Internally-hosted Applications and Servers Accessed Remotely
Read the original article: How to Secure Internally-hosted Applications and Servers Accessed Remotely Years ago I remember sitting in a cramped musty basement office surrounded by a curious array of computers, servers and old monitors. I was sipping tepid coffee…
How to Secure Internally-hosted Applications and Servers Accessed Remotely
Read the original article: How to Secure Internally-hosted Applications and Servers Accessed Remotely Years ago I remember sitting in a cramped musty basement office surrounded by a curious array of computers, servers and old monitors. I was sipping tepid coffee…
You Asked, We Listened: Developing the Duo Trust Monitor API Endpoint
Read the original article: You Asked, We Listened: Developing the Duo Trust Monitor API Endpoint Earlier this year, Duo announced a public preview of our new feature Duo Trust Monitor. As an access security company, we have a unique perspective…
Starting a Job Remotely Shouldn’t Slow Down Your Onboarding or Success
Read the original article: Starting a Job Remotely Shouldn’t Slow Down Your Onboarding or Success More and more people have been working from home since the onset of the pandemic. While there are tons of resources on getting started working…
Breaking Up With The iFrame: Introducing Our New Developer Tooling
Read the original article: Breaking Up With The iFrame: Introducing Our New Developer Tooling Dear iFrame, It’s hard to say this, but we need to break up. It’s not you. It’s us. (Well, it is sort of you.) We’ve been…
Zero Trust Is So Last Year…or Is It?
Read the original article: Zero Trust Is So Last Year…or Is It? I have two wonderful, intelligent, strong-willed and outspoken children. I wouldn’t trade them for the world. Some days when I think I have finally figured them out and…
Back to School: The Importance of Securing Remote Learning
Read the original article: Back to School: The Importance of Securing Remote Learning It has returned again, but this year the idea of ‘back to school’ has taken on an entirely different approach. I used to remember the long walk…
Letting The Right One In: A Preamble to Device Trust
Read the original article: Letting The Right One In: A Preamble to Device Trust I’m sorry, do I know you? A typical query that people may ask when confronted by an unknown person who walks up abruptly and starts asking…
Keep Calm and Secure the Remote Workforce
Read the original article: Keep Calm and Secure the Remote Workforce “Digital transformation has been forced upon every company that has any sort of digital workforce. We’ve seen a tremendous rush for companies to figure out how they get every…
A Thrilling Adventure: What a Site Reliability Engineer (SRE) Intern Has to Say
Read the original article: A Thrilling Adventure: What a Site Reliability Engineer (SRE) Intern Has to Say Ouch!! This is definitely not what you want to hear from your customers after developing a great product. If you want to batten…
Federal Modernization Here We Come! Agencies Prep for Zero Trust, Telework Guidance
Read the original article: Federal Modernization Here We Come! Agencies Prep for Zero Trust, Telework Guidance NIST has released the final version of SP-800-207, Zero Trust Architecture. Even with nearly everyone working from home, government guidance and policy folks have…
Case Study: Duo and Umbrella Thwart Malware & Phishing Attacks at Texas A&M
Read the original article: Case Study: Duo and Umbrella Thwart Malware & Phishing Attacks at Texas A&M Universities are prime targets for malware and phishing attacks. With large groups of people gaining access to a network from all over the…
#WeAreDuo Employee Spotlight with Kim Driscoll
Read the original article: #WeAreDuo Employee Spotlight with Kim Driscoll Have you ever wondered what life at Duo is like? Or what it’s like to be an Engineer, Product Designer, Account Executive etc. at Duo? How current employees landed their…
Kinder Than Necessary: Honoring Duo’s Community Impact Contest Winners
Read the original article: Kinder Than Necessary: Honoring Duo’s Community Impact Contest Winners The first-ever Duo Community Impact Award celebrates our team members who are impacting their communities and making the world a better place. Get to know our five…
Federal Zero Trust, Identity Assurance, and the Red Queen
Read the original article: Federal Zero Trust, Identity Assurance, and the Red Queen With the release of NIST SP 800-207, many cyber security professionals are reviewing their environments, and examining how Zero Trust principles and practices can enhance and aid…
A Game of Phones: Fighting Phone Phreaks in the 21st Century
Read the original article: A Game of Phones: Fighting Phone Phreaks in the 21st Century It is 11pm on an average Saturday night. The kids are in bed and I am on the couch not looking at the TV. My…
PODCAST: CISO Murder Board S1 E3: The CISOs Tackle Remote Work Costs
Read the original article: PODCAST: CISO Murder Board S1 E3: The CISOs Tackle Remote Work Costs Duo’s CISO Advisory team members are legends in their fields. They have seen it all, and they are ready to share their insights with…
The Winding Road: Why Duo Values Nontraditional Backgrounds
Read the original article: The Winding Road: Why Duo Values Nontraditional Backgrounds There is a tradition at Duo that every new employee, down to the newest intern, must give a three- to five-minute presentation introducing themselves to their team. There…
The Passwordless Journey Roadmap for Federal
Read the original article: The Passwordless Journey Roadmap for Federal It’s often said that technology deployments for federal agencies are a different animal. In fact, usually, that is not the case. Government agencies have the same needs, the same use…
Easier, More Effective MFA for ALL: The Duo Universal Prompt Project
Read the original article: Easier, More Effective MFA for ALL: The Duo Universal Prompt Project A long time ago, in, well, this galaxy… Since the earliest days of Duo, we’ve been energized by a core mission: To democratize security. That…
Pack Your Bag : A Gear List for a Successful Passwordless Journey
Read the original article: Pack Your Bag : A Gear List for a Successful Passwordless Journey Adopting new processes and technology solutions designed for the corporate workforce is a little like planning for a backpacking trip. The parallels are that…
“Duo &” – The Power of Great Combinations
Read the original article: “Duo &” – The Power of Great Combinations My History When I started my career at Duo back in 2015, I was amazed how the product disrupted the strong authentication marketplace. My main job was to…
5 Tips For Optimizing Duo Cloud Operations
Read the original article: 5 Tips For Optimizing Duo Cloud Operations Cloud operations is a critical component to “keep the lights on” for any deployment, this also applies to software-as-a-service (SaaS) solutions. As a service owner, you might apply IT…
How Phishing Impacts Healthcare
Read the original article: How Phishing Impacts Healthcare It was a murky morning in mid-March 2020 at around 5 a.m. local time when the public announcement system at Brno University Hospital in the Czech Republic started to repeat an unusual…
Providing a Passwordless User Experience
Read the original article: Providing a Passwordless User Experience Take a moment and remember your first time online, or perhaps your first time on a terminal. All that promise at your fingertips. You’re prompted for a password. Your first password.…
Providing a Passwordless User Experience
Read the original article: Providing a Passwordless User Experience Take a moment and remember your first time online, or perhaps your first time on a terminal. All that promise at your fingertips. You’re prompted for a password. Your first password.…
Virtual, But Still Vital: Attend Black Hat 2020 From Home
Read the original article: Virtual, But Still Vital: Attend Black Hat 2020 From Home It’s hard to believe we’re already halfway through 2020 and Black Hat is right around the corner. This year’s Summer Camp looks a little different —…
Virtual, But Still Vital: Attend Black Hat 2020 From Home
Read the original article: Virtual, But Still Vital: Attend Black Hat 2020 From Home It’s hard to believe we’re already halfway through 2020 and Black Hat is right around the corner. This year’s Summer Camp looks a little different —…
WHITE PAPER: How to Successfully Deploy Duo at Enterprise Scale
Read the original article: WHITE PAPER: How to Successfully Deploy Duo at Enterprise Scale At Duo, we have helped thousands of companies to enable secure access to applications and services from anywhere on any device. Enterprise multi-factor authentication (MFA) rollouts…
Can Passwordless Authentication Be Trusted?
Read the original article: Can Passwordless Authentication Be Trusted? Every new feature we introduce to our users is potentially a new tactic we provide our adversaries. When I was learning to drive, this happened with car steering wheel locks. Do…
Can Passwordless Authentication Be Trusted?
Read the original article: Can Passwordless Authentication Be Trusted? Every new feature we introduce to our users is potentially a new tactic we provide our adversaries. When I was learning to drive, this happened with the car steering wheel locks.…
VIDEO: Instantly Restore Accounts on Your New Phone!
Read the original article: VIDEO: Instantly Restore Accounts on Your New Phone! See the video at the blog post. We’re excited to announce that we are bringing Instant Restore to Android! This is a feature we launched earlier this year…
Instantly Restore Accounts on Your New Phone!
Read the original article: Instantly Restore Accounts on Your New Phone! We’re excited to announce that we are bringing Instant Restore to Android! This is a feature we launched earlier this year on iOS that makes changing phones easier than…
#WeAreDuo Employee Spotlight with Glenn Stempeck
Read the original article: #WeAreDuo Employee Spotlight with Glenn Stempeck Have you ever wondered what life at Duo is like? Or what it’s like to be an Engineer, Product Designer, Account Executive etc. at Duo? How current employees landed their…