Essential Information Security Controls: Device Inventory
Learn more about the Center for Internet Security’s Security Controls. In this blog, I cover the first control, Inventory of Authorized and Unauthorized Devices in more detail.
Thu T. Pham is a product marketing manager at Duo Security, now part of Cisco. She leads Cisco Zero Trust portfolio messaging and positioning. Thu has ten years experience in the tech and information security fields, as well as a BS in Journalism from Central Michigan University.
Learn more about the Center for Internet Security’s Security Controls. In this blog, I cover the first control, Inventory of Authorized and Unauthorized Devices in more detail.
Duo updated our Securing Remote Access Guide with recent real-world breach examples and our new security recommendations on how to mitigate the risk of remote access threats.
Learn what trusted devices are, how you can verify the identity of your users at login, and how trusted devices fit into a trusted access strategy.
Here’s our analysis of the in-depth report on the OPM breach of over 20 million records and how leadership, spending and critical security failures led to a massive federal compromise of security clearance files, personnel data and fingerprint records.
Learn what makes a trusted user & how to protect your networks against hackers who exploit trust, compromise passwords, and impersonate identities.