Aw CRUD (Create / Read / Update / Delete): Extended Policy Capabilities in Duo’s API
Security policies are increasingly challenging to manage and maintain. Learn how to leverage Duo's APIs to secure your organization.
4 Articles Found
Security policies are increasingly challenging to manage and maintain. Learn how to leverage Duo's APIs to secure your organization.
One piece of feedback we heard time and again was that the risky login events would be more useful if leveraged within a more central security tool. Customers want programmatic access to risky login data. You asked, and we listened.
At this year’s Black Hat Europe conference in London, Duo Labs researchers present "Chain of Fools: An Exploration of Certificate Chain Validation Mishaps." They will investigate what can go wrong in the implementation of certificate chain validation, the circumstances that lead to these incorrect implementations, the impact of these issues, and the patterns of bad advice on the internet that sustain the problem.
> In the world of security assessments, penetration testing often stands out as "the service I need to have done" when businesses are desiring to seek out a third-party evaluation of their security posture. However, there can be a large gap between the reality of penetration testing versus what a company actually needs to have done.