Endpoint Security , Enterprise Mobility Management / BYOD , Open XDR

How the Remote Workforce Is Changing the Threat Landscape

Duo Security's Jon Oberheide on Securing Access to Devices, Cloud Services
Jon Oberheide, CTO, Duo Security

Today's workforce increasingly works remotely and relies on a variety of devices and cloud services to accomplish their jobs. Organizations must support and secure this push, or they risk driving employees to adopt less secure - or corporate-managed - forms of shadow IT, warns Jon Oberheide of Duo Security, a Cisco company.

See Also: Live Webinar | Cyber Resilience: Recovering from a Ransomware Attack

In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Oberheide discusses:

  • Security challenges posed by a workforce that increasingly works remotely;
  • How "bring your own device" security concerns and challenges have evolved;
  • The "zero trust" principle.

Oberheide is CTO of Duo Security. Wile his research interests span across the security domain, he has expertise in mobile security, cloud security and malware analysis. He held positions at Merit Network and Arbor Networks before co-founding Duo Security in 2009. The company last year became part of Cisco.

About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.