Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Bye Login, Hi Unlock: FIDO2 WebAuthn Goes Biometric Miguel Fersen, Senior Cloud Consultant GlobalDots ; Eli Arkush, Senior Solution Engineer, Transmit Security Come 2022, online businesses like retail, entertainment & consumer finance, are under increasing pressure: Competition is fierce, and cyber threats ri... 1 week ago | 52 mins Cybersecurity Insurance and MFA: What You Need to Know Cole Haney, Darcie Gainer, Jim Salmonson In this webinar, you will learn: What cyber liability insurance is, and why it’s increasingly a necessity for organizations of every size Why multi-f... 3 weeks ago | 58 mins From VPN to VPN-less: Modernizing Secure Remote Access Seema Kathuria In this webinar, you will learn: Why using a VPN-less approach enhances security while minimizing user friction How the Duo Network Gateway helps org... 4 weeks ago | 60 mins Secure Your Public Sector House with a Duo Deadbolt Bart Green and Bob Slaney In this webinar, you will learn: Why a work-from-anywhere security strategy needs to include better user and device visibility, not just MFA How zero... 1 month ago | 55 mins Duo and Guest Speaker Forrester Analyst Steve Turner Demystify Zero Trust Amanda Rogerson, Product Marketing Manager, Duo / J. Wolfgang Goerlich, Advisory CISO, Duo / Steve Turner, Analyst, Forrester Join this session with Amanda Rogerson and J. Wolfgang Goerlich from Duo Security at Cisco, joined by special guest Steve Turner from Forrester, for a... 9 months ago | 60 mins Anatomy of a ransomware attack Anastasia Hurley [Sr Product Marketing Manager], Fleming Shi [CTO] Attend this webinar to find out how today’s devastating ransomware attacks unfold. And see why only a multi-layered, comprehensive security posture ca... 9 months ago | 62 mins Securing Access Beyond MFA: How Duo Protects Box Mark Schooley, Senior Director of IT Operations at Box / Dave Lewis, Advisory CISO at Duo Securit Join Mark Schooley, Senior Director of IT Operations at Box, along with Dave Lewis, Advisory CISO at Duo Security, and Ganesh Umpathy, Product Marketi... 10 months ago | 60 mins Ep 5 - Top 5 Pitfalls to Avoid in Client-Side Security Dor Zakai, Senior Director Solutions Engineering, F5 and Patrick Zoller, Security Solutions Architect, F5 As you secure your applications and protect them from security breaches and fraud events, you've likely turned to preventative and detective controls ... 1 week ago | 60 mins Your PAM Checklist – Practical Steps to Achieve Privileged Access Security Joseph Carson, Chief Security Scientist at Delinea Today, all users must be considered privileged users since one compromised user can be exploited to turn a simple breach into a cyber disaster. To pro... 2 weeks ago | 54 mins How to Detect and Prevent Account Takeover Attacks and Protect Your Customers Lizzie Clitheroe - Arkose Labs, James Roche - FICO, Ah Khan - BMO Fintechs and banks face a complex and highly organised cybercrime ecosystem. The 2019 Official Annual Cybercrime Report predicted that by 2021 cybercr... 1 week ago | 62 mins Load more