Beyond S3: Exposed Resources on AWS
It's not just S3 buckets that are exposed. Duo's security research team found a number of other publicly available Amazon Web Services (AWS) resources, including cloud backup and misconfigured servers.
It's not just S3 buckets that are exposed. Duo's security research team found a number of other publicly available Amazon Web Services (AWS) resources, including cloud backup and misconfigured servers.
Stop investing in bolt-on security solutions that need to be ripped out and replaced as you grow, and focus on integrated, scalable and built-in security instead.
Going beyond multi-factor authentication (MFA) means adding controls and checks to secure the other harbinger of malware and risks to your network - devices, also referred to as endpoints.
We've released a set of analytics enhancements to the Duo dashboard to help our customers find information and enable better security analysis; including three new authentication and deployment reports, and an update to our Authentication Log.
Duo's security team explores how the T2 coprocessor is being used by Apple and how it fits into the larger system security model, as well as how this may evolve in the future.