Part 1: Usability Is Security
In this two-part series on usability and security, we'll explain what users expect from effective authentication and authorization tech, and how to apply these lessons to the next generation of tech.
As Duo's security research team, Duo Labs is dedicated to disrupting, de-risking and democratizing complex security topics and sharing their innovations with the broader community. Learn more: duo.com/labs
60 Articles Found
In this two-part series on usability and security, we'll explain what users expect from effective authentication and authorization tech, and how to apply these lessons to the next generation of tech.
Visually mapping social network connections reveals patterns that may otherwise be hidden in the data. Plus, these graphs serve as compelling pieces of generated artwork. This post shows the step-by-step process to create a graph of your own social network using Gephi.
Duo Labs releases their results of a three-month long research project on identifying Twitter bots and botnets at a large scale ahead of their talk at Black Hat USA 2018, along with plans to open-source their data collection code source.
It's not just S3 buckets that are exposed. Duo's security research team found a number of other publicly available Amazon Web Services (AWS) resources, including cloud backup and misconfigured servers.
Duo's security team explores how the T2 coprocessor is being used by Apple and how it fits into the larger system security model, as well as how this may evolve in the future.