The Science of Duo in Space, Pt. 3: It’s (Test) Launch Time
In the third of a weeklong series about the technology and process behind Duo In Space, Senior Security Researcher Mikhail Davidov takes us on a tour of the test launch.
In the third of a weeklong series about the technology and process behind Duo In Space, Senior Security Researcher Mikhail Davidov takes us on a tour of the test launch.
In the second of a weeklong series about the technology and process behind Duo In Space, Senior Security Researcher Mikhail Davidov discusses assembling the payload and preparing for the test launch.
In the first of a weeklong series about the technology and process behind Duo In Space, Senior Security Researcher Mikhail Davidov shares how the project came to be, and breaks down the key components of building an object to float high into the atmosphere.
Technology can only assist us and is not a solution to our problems. We need to look at our process before implementing tools in order to be successful.
Duo updated our Securing Remote Access Guide with recent real-world breach examples and our new security recommendations on how to mitigate the risk of remote access threats.
Learn what trusted devices are, how you can verify the identity of your users at login, and how trusted devices fit into a trusted access strategy.
Duo can secure any remote desktop workload, regardless of whether they are hosted on-premises or in the public cloud. Here’s how Duo integrates with Microsoft RDP, RD Gateway & RD Web.
Here’s our analysis of the in-depth report on the OPM breach of over 20 million records and how leadership, spending and critical security failures led to a massive federal compromise of security clearance files, personnel data and fingerprint records.
Duo’s two-factor authentication methods were reviewed by Drummond Group, a DEA accredited security auditor, to meet EPCS requirements. Duo also provides a native integration with electronic health record (EHR) systems such as Epic Hyperspace.
Learn what makes a trusted user & how to protect your networks against hackers who exploit trust, compromise passwords, and impersonate identities.