Managed or Unmanaged Device? Duo’s Device Trust Has You Covered
Securing endpoints can be difficult, unless you have Duo's Device Health app. Learn how this app can help you secure managed and unmanaged network devices.
Securing endpoints can be difficult, unless you have Duo's Device Health app. Learn how this app can help you secure managed and unmanaged network devices.
Duo is excited to announce our recognition as a Customers' Choice Access Management vendor for 2022 by Gartner Peer Insights. Learn all about it in our blog!
Users, admins, security teams...no one likes managing passwords. Read our latest article to learn how Duo is paving the way to a secure, passwordless future.
Expanding our existing presence in the United States, Canada, Ireland, Germany, Australia, Singapore and Japan provides customers, particularly those in highly regulated industries such as public sector and financial services, with more choice over service delivery locations.
Security has an imperative to become accessible for the broader market. How can design be used to introduce a new way of problem solving in security?
Over two years as product designer at Duo, Sierre Wolfkostin has observed the inner workings of a healthy, resilient work culture — one that remained strong, even in the midst of a dramatic shift to remote work. Here’s what it takes to create one.
Want to learn more about the exciting work the Duo team is doing as we migrate to Kubernetes? Read our latest blog post to find out!
Recent cyber attacks have led to developments in cyber liability insurance. Learn how multi-factor authentication can help small-to-midsize businesses manage risk (and premiums).
One-time passwords have become mainstream, but recent trends show that bad actors are targeting organizations by using OTPs in phishing attacks. Let’s review what one-time passwords are, how phishing takes advantage of them, and how multi-factor authentication can help mitigate this risk.
For Linux systems, Pluggable Authentication Modules are used to standardize authentication. Ensuring that you have a strong understanding of how to configure your PAM stack before involving Duo will ensure that you’re ready for the next step of securing your systems.