Remove design-thinking-in-action
article thumbnail

How Design Thinking Drives People-Focused Innovation at Duo: Design Thinking in Action

Duo's Security Blog

Part two in a three-part series on design thinking at Duo. In addition to formal trainings, Valeria and her team provide customized working sessions, facilitation and coaching to bring design thinking principles into customer and team experiences. “We We do a lot of coaching and mentoring,” Valeria said.

article thumbnail

How Design Thinking Drives People-Focused Innovation at Duo: An Introduction

Duo's Security Blog

Part one in a three-part series on design thinking at Duo. While our culture of belonging helps us prioritize these values in our work, broader Cisco reaffirms and amplifies them through its design thinking program. What is design thinking?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Design Thinking Drives People-Focused Innovation at Duo: Activities You Can Try

Duo's Security Blog

Part three in a three-part series on design thinking at Duo. Previously: Design Thinking in Action. Feeling inspired by design thinking? Here are some design thinking tools and exercises that will help you gather and analyze data, and ideate, prioritize, visualize and validate your solutions.

article thumbnail

Stealing More SRE Ideas for Your SOC

Anton on Security

Think about it?—?it’s As we discussed in “Achieving Autonomic Security Operations: Reducing toil” (or it’s early version “Kill SOC Toil, Do SOC Eng” ), your Security Operations Center (SOC) can learn a lot from what IT operations learned during the SRE revolution. evolving automation. and to make new discoveries in this process too.

article thumbnail

Security Roundup May 2024

BH Consulting

Microsoft followed this with a blog detailing six actions the company will take as part of its Secure Future Initiative. Those actions are: protect identities and secrets; protect tenants and isolate production systems; protect networks; protect engineering systems; monitor and detect threats; accelerate response and remediation.

article thumbnail

Reflective Practice and Threat Modeling (Threat Model Thursday)

Adam Shostack

If you’re reading this blog, you may have seen that some people are nearly mad about threat modeling. A book I’ve read recently, “ The Reflective Practitioner: How Professionals Think In Action ,” gives some useful perspective. The ones who say “you’re never done threat modeling.”

article thumbnail

Massive utility scam campaign spreads via online ads

Malwarebytes

This blog post has two purposes: the first one is to draw awareness to this problem by showing how it works. Secondly, we’ve collected and shared as many ads and fake sites as we could in the hope that action will be taken, with hopefully some cost for the scammers. Do not trust any phone number that appears on an online ad.

Scams 140