A White House advisory group, The President’s National Infrastructure Advisory Council (NIAC), has released an 11-step report urging the Administration to take action to protect against “a watershed, 9/11-level cyber attack.”
An overview of tracking ransomware payments, tools to fight ransomware attacks, 3D printing security concerns and more from Black Hat 2017 and DEF CON 25 talks this year.
NIST releases a new version of their Security and Privacy Controls, addressing new risks posed by the latest technology - the Internet of Things, plus guidance on combining single sign-on and multi-factor authentication.
Get insights into how to assess security hardware, including experimentations in counterfeiting U2F authentication tokens, different weaknesses in the hardware components of encrypted USB keys and more.
A recently patched, high-severity Windows vulnerability, CVE-2017-0199, is being used in phishing attacks to deliver malware to users - hitting 1.5 million users in Q2 of this year.
Different types of organizations have different threat profiles - instead of classic benchmarking, which can be problematic, researching and creating organizational personas can help us better understand how they approach security issues.
Learn about the complexities of conducting security science and phishing tests - the psychological dynamics, validity of security usability studies, ethical issues, hallway testing and more.
Duo has produced videos in-house since 2013, but until recently we never tackled a broadcast quality commercial on our own. Our senior media producer gives a look behind the scenes of "Duo Vs. Everybody," a complex, extensive production that was our first to include professional actors and a full video crew.
New NIST guidelines recommend using long passphrases instead of seemingly complex passwords - check out a summary of the new best practices for password security in NIST’s SP 800-63B.
Duo Labs analyzes npm packages and how attackers can use malicious packages to gain access to and control over systems.
Get security conference OPSEC (operational security) tips from a senior security researcher who has seen it all - from trading trust for convenience to unattended personal items, learn how to lock it down when you’re on the road.
It’s true there’s no shortage of black hoodies or console-inspired color schemes at events like DEF CON, but this one-dimensional image misses a lot of the truth, explains Zoe Lindsey, Advocacy Manager at Duo.