Duo Security’s CTO and co-founder Jon Oberheide will be speaking at the third annual Napa Summit 2014: The Xconomy Retreat on Technology, Jobs and Growth on a panel about cyber security hosted in California.
> Last week, our Principal Security Architect, Adam Goodman lead an informative webinar on protecting against the recent OpenSSL Heartbleed vulnerability along with CSRgroup’s Chief Scientist, Jake Williams.
The New York State of Department of Financial Services recently released a report on their industry survey results of cyber security within the banking sector as a response to the increasing number, sophistication and scope of cyber attacks against the industry.
Duo Security’s interns have arrived for the summer! The engineering interns are working on internal projects, documentation, integrations and more within the Duo headquarters in Ann Arbor.
> About a month ago, a couple Duobots hopped a train to Chicago, IL to post up at Threadless’ headquarters covered with wall-to-ceiling graffiti art, featuring designs and t-shirts hanging from every corner, with art spanning the bathroom walls.
Duo Tech Talk guest speaker, security research Collin Mulliner discusses his research on probing mobile operator networks. If you missed the talk, watch the video! And join our Duo Tech Talk Meetup group to stay updated on upcoming talks hosted at our Ann Arbor office.
> In the three years since PCI DSS 2.0 was released, the landscape of information security has changed rapidly. Previously, cloud computing initiatives may have been "on the horizon", but are now a key part of the infrastructure powering everyone from small businesses to Fortune 500 companies.
The aftermath of a data breach brings up many questions, including why certain security tools weren’t implemented in the first place to prevent simple attacks that were the result of stolen credentials. These breaches highlight the importance of implementing a solution that can effectively stop credential-based attacks.
BYOD can introduce new security issues - here’s five ways your “bad” BYOD habits are rendered irrelevant by two-factor authentication.
It's not always easy to determine when a certain technology or buzzword has really integrated into the mainstream. Unless, you know, the mayor of one of America's most notable cities actually creates an entire week for said technology/buzzword.
Vendor security is becoming a major concern in many different industries, and is even regulated in the healthcare industry by HIPAA compliance standards that puts healthcare vendors directly in scope of the rule.