Learn about the science of Duo in space, a mission to perform the first Duo Push authentication from high into Earth's atmosphere while streaming live.
In the fourth of a weeklong series about the technology and process behind Duo In Space, Senior Security Researcher Mikhail Davidov reviews the test launch results and refines the payload based on his findings.
In the third of a weeklong series about the technology and process behind Duo In Space, Senior Security Researcher Mikhail Davidov takes us on a tour of the test launch.
Out-of-date endpoints pose a major security risk for any organization. See Duo’s data on customer adoption of macOS 10.12, and learn more about how you can ensure regular, timely updates to protect against the latest threats.
In the second of a weeklong series about the technology and process behind Duo In Space, Senior Security Researcher Mikhail Davidov discusses assembling the payload and preparing for the test launch.
In the first of a weeklong series about the technology and process behind Duo In Space, Senior Security Researcher Mikhail Davidov shares how the project came to be, and breaks down the key components of building an object to float high into the atmosphere.
Duo Security makes its mark at the first-ever O’Reilly Security Conference agenda as Director of Security Mike Hanley delivers “Lessons Learned From Billions of Authentication Events.”
Technology can only assist us and is not a solution to our problems. We need to look at our process before implementing tools in order to be successful.
In the past few months, we’ve been working on making our Duo Authentication Prompt more accessible to our users. We’re aligning to the Web Content Accessibility Guidelines (WCAG) 2.0.
One of the most common questions the Duo Labs team got during their recent Reddit AMA was how they got their start in information security, and how aspiring security researchers can launch a career. Here, two of our senior Labs hackers share their stories.
Duo Security is proud to announce its third annual Women in Security Awards. This honor recognizes women whose expertise, leadership and community engagement inspire new generations to innovate the security industry.
While zero-days have been known to grace unsuspecting victims left vulnerable without a vendor security patch in sight, the major culprit for high-profile data breaches is something far more simple - poor security (cyber) hygiene.
A great deal has been published about various approaches to fuzzing in recent years. Like any good research team, we’ve been keeping the cores warm in the never-ending search for bugs.
There have been reports of an uptick in the use of the RIG exploit kit to deliver the CrypMIC ransomware to unsuspecting users.
Access security is more important than ever, now that most organizations are moving toward a mix of on-premises and cloud-based applications.
The (New) Essential Guide to Securing Remote Access Industry News / Featured Article
We’ve updated our Securing Remote Access Guide to feature recent real-world breach examples and our new security recommendations on how to mitigate the risk of remote access threats.