Our ancestors had to confront the issue of home and personal security and we can learn a lot from how they successfully protected their homes from intruders. Home security systems have been developed since the first home was impacted by criminals. Make sure your home and property are securely protected from would be intruders.
Gun Tower Museum
With only a handful of years of wisdom under my belt, I’ve come to realize that the world works in ways you never expect. The big “P” was a challenge that no one could have prepared for, but o
Giving back to our local and global communities has always been a big part of Duo’s culture. This tradition inspired us to launch the Duo Commmunity Impact Awards, now in its second year, which r
When I open my laptop for the first time in the morning, one of the first things I check is my email. As a Duo team member, and as part of the greater Cisco organization, I am one of more than 258 m
This blog is part of an ongoing blog series for Duo’s Universal Prompt Project. The project is a major re-architecture and redesign of the Duo multi-factor authentication experience. In this post,
Part of our Administrator's Guide to Passwordless blog series See the video at the blog post. In some ways, the term “passwordless” is a misnomer. Yes, it’s a password-less authentication me
You can always expect certain things at the height of a Las Vegas summer: sunshine, sweltering heat, and Hacker Summer Camp. While last year was different because most of the events were either virt
The insidious nature of malicious software has not been lost on any of us. Computers and networks have been dealing with malware in one form or another for decades. Though in recent weeks ransomware
Four years ago, the Australian Signals Directorate created the “Essential Eight” — recommendations to secure federal entities and improve cybersecurity protections. This month, the Attorney Ge
When COVID hit, as a leader working remotely at Cisco, I immediately started thinking about my team. How would we handle working together through quarantine? How do successful managers operate durin
Part of our Administrator's Guide to Passwordless blog series See the video at the blog post. Tall Tale #1: PINs Are Just Passwords In Part 1, we talked about how passwordless authentication is st
All feed content copyright theiir respective owners. Use of links to and summaries of content by this site in rss curation falls under fair use for the purpose of reporting and commentary.