Duo Security will be attending and exhibiting our Trusted Access solution at InfoSecurity Europe from June 7-9 this year, hosted at the Olympia conference center in London.
Duo is now an approved supplier on the UK Cyber Growth Partnership list, offering a Trusted Access solution to protect organizations in the European Union.
Google Chrome recently announced that by Q4 of this year, HTML5 will be the default in the Chrome browser, switching over from Adobe Flash Player to save on power, deliver faster load times and protect against Flash vulnerabilities.
At Duo, one of our core values is around usability, because the more usable our solution is, the more likely it is to be used. The more your users are covered, the less likely it is for you to be breached.
In this blog, we’ll discuss how many Android phones are affected by a critical QSEE vulnerability, according to our data, and what you can do to mitigate associated risks.
> For customers in the European Union (EU), Duo has partnered with Amazon to host and deliver its two-factor authentication service from Amazon’s data centers located in Germany and Ireland.
The most recent confirmed retail data breach affecting about 5 percent of Wendy’s restaurants involved a compromise of their point-of-sale (POS) system. Access to POS devices, including POS terminals, are often targeted by attackers as they collect magnetic stripe information from customers, which includes credit and debit card numbers.
Updating Devices to Protect Against the Threat of Ransomware Industry News / Featured Article
Updating devices to the latest version and fully patching can prevent the spread of ransomware - find out how in the Duo 2016 Trusted Access Report.
Duo Security will be at the Internet2 Global Summit hosted at the Chicago Marriott Downtown from May 15-18, exhibiting security solutions to help protect higher education, as well as hosting special events and presentations on authentication in education.
We just released our first data-driven report, The 2016 Duo Trusted Access Report: The Current State of Device Security; an in-depth analysis of the security health of millions of devices and the risk they bring to companies.
Here’s the main takeaways from the Verizon 2016 Data Breach Investigations Report (DBIR) - phishing is up, stolen or weak credentials are master keys, and old vulnerabilities still work for attackers.
Learn more about the new security requirements for PCI DSS 3.2, including expansion of multi-factor authentication, pentesting, security control failure checks and more.