Two months after the global WannaCry ransomware outbreak, a new wormlike malware variant has more recently plagued 64 countries, disrupting operations worldwide. But is it actually ransomware? Here’s what you need to know.
Learn about the common phases of incident response, as it relates to information security. At Duo, our incident response includes detection, reporting/alerting, triage, analysis, containment, mitigation and follow-up.
The WannaCry debacle and most recent MaybeNotPetya attack has revealed that there are countless unpatched systems - no big surprise. Here’s what’s keeping organizations vulnerable, and what we can do about it.
The healthcare industry is faced with many inherent challenges and barriers to security adoption - here’s the latest security recommendations from the HHS Cybersecurity Task Force.
Many large enterprise organizations are switching from legacy two-factor solutions – which add friction, cost and complexity – to Duo's lightweight, cloud-based solution that's both designed for the modern era and reduces overhead while adding greater security benefits.
In his latest bit of odd research, Duo Labs' Mark Loveless takes a closer look at IoT as he pulls apart a wireless drill, bit by bit.
New phishing attacks are encrypting their web pages to appeal to users’ security sensibilities, while Gmail releases a suite of security tools to crack down on phishing emails.
Duo Security and Global Risk Institute (GRI) co-hosted an executive breakfast in Toronto to provide an update on current security trends and key information that leaders need to know.
You can't secure what you can't see. To shed light on who’s at risk, Duo has collected and analyzed our dataset of 4.6 million endpoints, completing over two hundred million authentications a month - all now available in The 2017 Duo Trusted Access Report.