The endless string of retail breaches discovered late last year and continuing through this year has everyone on edge, waiting for news of the next major retailer to be hit with somewhat mysterious POS (Point of Sale) malware.
One notable difference between last year’s Verizon Data Breach Investigations Report (DBIR) and this year’s is the repeated references to two-factor authentication as a major security recommendation to protect against all types of threats.
What to Look for in a Modern Two-Factor Authentication Solution Industry News / Featured Article
Here are a few important qualities you should look for in a modern two-factor authentication solution, from cloud services to easy deployment and more.
A recent wave of phishing attacks reveal that attackers are now installing web server software on home computers and uploading numerous phishing pages that they link to in spam emails targeting financial institutions and payment services.
We released an integration video to show you just how easy it is to set up two-factor authentication with your web-based application using Duo’s web SDK. Duo client libraries are available for Python, Ruby, Classic ASP, ASP.NET, Java, PHP, Node.js, Coldfusion, and Perl.
The Duo Security team is back from SOURCE Boston 2014 and ready to share new details about BuildItSecure.ly and clue you in to some of the awesome talks we caught. If we missed you while we were in town, we're sorry but we'll be back soon...
This post is the second of a blog mini-series around the Heartbleed vulnerability and some of defense-in-depth techniques we've had in place for years that helped mitigate its impact.
Did you miss our webinar with SANS and TrustedSec? Watch a video recording of How to Strengthen the "Weakest Link" with Two-Factor Authentication.
We’ve released a new version of Duo Mobile 3.2 for Android, available now in the Google Play Stores. By making the authentication process even leaner, we’ve made it faster and easier to authenticate via our two-factor authentication mobile app.
> With new security and business models emerging, what with BYOD and the cloud, there comes a demand for an adaptable, responsive authentication solution that can work with our growing number of devices and need for greater security.
While the initial concern about Heartbleed focused around the exposure of confidential data and private key material, security researchers quickly realized a more insidious attack: remote session hijacking.
The FFIEC has released an advisory on the latest attacks to hit small and medium-sized financial institutions, also known as Unlimited Operations, in which thieves are maxing out or even exceeding the limits on bank accounts after they gain access to the web-based ATM administrator panels.
tl;dr: Duo’s cloud service was fully patched and protected against Heartbleed within hours of the vulnerability being publicly disclosed.
We're proud to announce that Duo Security is not only giving a presentation, but also sponsoring SOURCE Boston this year.
> As the number of compromised major online media publications continues to rise, the attention should be focused on journalist information security standards, or rather, the lack thereof.
> Healthcare data breaches are on the rise from 2012 to 2013, as Experian’s 2014 Data Breach Industry Forecast report reveals. Another report finds that there was a 137.7% increase in patient records breached from 2012 to 2013.
> While the retail industry has been in the spotlight lately for a rash of high-profile data breaches, vendors that support the industry have also been scrutinized lately for their role in keeping data secure, including law firms in particular.