This is a general guideline aimed at first-time attendees to Black Hat and DEF CON.
"D" is for Data; that's good enough for me! Here at Duo Labs, we’ve been busy slicing and dicing the usage data that we’ve collected over the years, so let's talk about what actual usage of 2FA looks like.
Duo believes that a simple end-user experience is paramount to the adoption of any security product, as evidenced by the rapid adoption of Duo Push as an authentication method for smartphones and smartwatches. Today, we are demonstrating that belief to administrators everywhere, by releasing a redesigned and simplified Duo Admin Panel.
A data breach may be in the news one week and out the other, but the real lasting business impact and consumer effects can be felt long after the fact, as the recent reinstatement of a lawsuit tied to the Neiman Marcus breach of January 2014 proves.
The effects of the Hacking Team hack are still being felt, but some are trying to help organizations do some damage control and look for signs of infection from their spyware.
How can you protect your company against remote access attacks? Find out how by downloading The Essential Guide to Securing Remote Access: Preventing Data Breaches With Strong Authentication from Duo Security.
> This week, Adobe, Oracle and Microsoft patched for several critical vulnerabilities found in the 400GB dump of Hacking Team’s intellectual property and proprietary exploit code that some researchers are still combing through.
The Federal Trade Commission (FTC) has released a list of data security guidelines gleaned from the agency’s 50+ data security settlements.
A new survey from HIMSS (Healthcare Information and Management Systems Society) found that 87 percent of healthcare officials rate information security as an increasing business priority. Another two-thirds reported that their organization had experienced a significant security incident.
Dyre - oh, Dyre; the banking Trojan we love to hate - is sticking around, as a recent phishing campaign against U.K. banks revealed.
Duo hosted a Security Summit in San Francisco this year, welcoming infosec professionals and industry leaders to discuss new security strategies and technology. If you couldn’t join us, check out videos of the talks below!
> Want to go to DEF CON but don’t want to spend money you could otherwise lose gambling in Vegas? Do you want to avoid standing in an epic lineup of hackers just to get your DEF CON pass? Duo Labs wants to help you out. For the small price of some attention on Twitter, three lucky people will receive free passes from Duo Security to DEF CON 23.
The irony is quite strong in this one: Italy-based Hacking Team, an international spyware company that provides surveillance technology to government agencies, was hacked.
Plex, a media streaming service, announced that their forum and blog servers were hacked - meaning your email address, IP address, forum messages and encrypted (hashed and salted) password may have been stolen.
Financial losses associated with security incidents have increased 24 percent in 2014 in the finance sector, with overall detected security incidents increasing 8 percent, according to PricewaterhouseCoopers’ Global State of Information Security Survey: Financial Services.
While there’s plenty of dismal news unraveling in the wake of the epic OPM breach, there’s a lot of positive learning to be had as well. The agency released an OPM Cybersecurity Action Report outlining specific steps they planned to take to remediate and strengthen their internal security posture.