Duo Security
Duo Security
YouTube Video

New YouTube videos detected.

  • How to Install Duo Authentication for OpenVPN
    Duo Security (https://www.duo.com) provides a two-factor authentication integration for the OpenVPN Community Open Source Software Project that is easy to deploy, use, and manage. This demonstration video shows how to set up our OpenVPN integration in just a few minutes. For additional information on this integration visit our OpenVPN documentation at https://duo.com/docs/openvpn. Note that Duo a...
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • NIST’s New Security and Privacy Controls For IoT, MFA and SSO
    NIST has released the fifth revision of the Security and Privacy Controls draft of Special Publication 800-53 (PDF), now available for comments through September 12, 2017. The old draft was last fully rewrote in 2013. In this draft, NIST has incorporated state-of-the-practice controls based on new threat intel, plus changed the structure of the controls to make them more outcome-based. They’ve al...
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • Dissecting Security Hardware at Black Hat and DEF CON
    One in seven USB drives with company data are lost or stolen, according to a survey recently conducted by Google’s Security, Privacy and Abuse Research team. A seemingly straightforward mitigation would be to mandate that all USB drives with corporate data use hardware-based encryption. However, this still means that one in seven of those drives are going to get lost or stolen, so administrators ...
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • Phishing Emails Leverage Recently Patched Windows Vulnerability
    A recently patched, high-severity Windows vulnerability, CVE-2017-0199, is being used in phishing attacks to deliver malware to users. CVE-2017-0199 exploits a flaw in the Windows Object Linking and Embedding (OLE) Microsoft Office interface, allowing an attacker to take control of systems, steal or destroy data, and retrieve malicious files from a remote server and install them on a victim’s com...
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • Security Anthropology: How Do Organizations Differ?
    During Duo’s Second Wind Breakfast in Las Vegas last month, I talked about how we as security professionals might be under the impression that our users and customers are visitors to our Tech Country, when in reality it might be that we are visitors to their Business Country. And if that’s the case, we won’t be understood simply by speaking our own language More Loudly, or in Their Accent. Not onl...
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • Examining Security Science at Black Hat 2017
    Daniel Kahneman, in his 2011 book “Thinking, Fast and Slow,” describes two modes of thought: “System 1,” the fast, emotional, instinctual system, and “System 2,” the slow, rational, deliberative system. System 1 is more efficient at quick decisions, but concepts like information security aren’t incorporated. In her Black Hat 2017 talk “Ichthyology, Phishing as a Science,” Stripe Security Engineer...
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • Lights, Camera, Action: The Making of Duo's First In-House Commercial
    In late 2016, Duo’s creative team had the idea to shoot our first broadcast quality commercial - affectionately codenamed “Duo Vs. Everybody.” Because IT security products have traditionally been as cumbersome as the networks they're trying to secure, we wanted to play with the idea that you don't solve complexity by adding more complexity. Duo has produced our own videos since 2013, but this pro...
Duo Security
Duo Security
YouTube Video

New YouTube videos detected.

Duo Security
Duo Security
Blog Post

New blog articles detected.

  • NIST Update: Passphrases In, Complex Passwords Out
    In June, the National Institute of Science and Technology (NIST) released new standards for password security in the final version of Special Publication 600-83. Specifically, NIST refers to new password security guidelines in the document SP 800-63B: Authentication & Lifecycle Management (PDF). Federal agencies and contractors use NIST’s standards as guidelines on how to secure digital identities...
Duo Security
Duo Security
YouTube Video

New YouTube videos detected.

Duo Security
Duo Security
YouTube Video

New YouTube videos detected.

  • Google + Duo = Duo Beyond
    Duo founders Dug Song and Jon Oberheide talk about the philosophy behind Google's BeyondCorp security model, and how you can launch it at your organization with Duo Beyond. Origins & vision of BeyondCorp: duo.sc/beyond-part1 Components & implementation of BeyondCorp: duo.sc/beyond-part2 Duo Beyond facts & features: duo.sc/beyond
Duo Security
Duo Security
YouTube Video

New YouTube videos detected.

  • 2017 Duo Trusted Access Report
    Download it free: duo.sc/2017-trustedaccess Discover the latest trends in enterprise security, where the weaknesses lie, and how you can secure and protect your organization, all in the 2017 Duo Trusted Access Report.
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • Hunting Malicious npm Packages
    Last week, a tweet was posted showing that multiple packages were published to npm, a Javascript package manager, that stole users’ environment variables: @kentcdodds Hi Kent, it looks like this npm package is stealing env variables on install, using your cross-env package as bait: pic.twitter.com/REsRG8Exsx— Oscar Bolmsten (@o_cee) August 1, 2017 The names of these malicious packages were typ...
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • Security Conference OPSEC
    While we as security professionals regularly watch out for such dangers as creepy “free” Wi-Fi hotspots, evil hoodied hackers typing in their fingerless gloves unleashing havoc, and the dreaded nation-state spy rings assaulting us for our corporate secrets, there are, perhaps, other dangers one should look out for - ourselves. Photo 1: A sea of unmonitored bags at the “check your bag” area at a...
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • Sometimes You Wanna Go Where Everybody Knows Your $NAME
    If you ask most people to picture a hacker, their description probably sounds something like this: a shadowy figure in a black hoodie, typing furiously at a screen glowing with green-on-black code scrolling faster than anyone could read. (Hard to visualize? Treat yourself to a look at Google image search results for “hacker.” It’s true there’s no shortage of black hoodies or console-inspired co...
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • Securing BYOD With Duo’s Trusted Endpoints for Mobile
    Living in the Bay Area and working at innovative technology companies may have jaded my perception of Bring Your Own Device (BYOD) and the value it can provide to an organization if implemented properly. Over my short career, I have watched the migration of macOS into the workplace and the evolution of mobile devices as core business tools. Both of these were traditionally focused on consumers bu...
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • What is Modern Two-Factor Authentication (2FA)?
    Three years ago, I wrote about the different criteria to consider when choosing a modern two-factor authentication (2FA) solution, in What to Look for in a Modern Two-Factor Authentication Solution. But the areas of access security and identity have evolved quickly since then. Here are a few updated aspects to look for in a (more) modern 2FA solution, to address the latest risks: Easy & Fast for...
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • New Open-Source Phishing Tools: IsThisLegit and Phinn
    Phishing affects every organization. The ability for attackers to easily send thousands of emails, many of which have significant success rates, makes phishing a common and effective attack method and a headache for administrators. Duo is in the business of helping organizations solve some of the biggest challenges in security. This is why we're excited to announce two new open-source tools desig...
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • Key Updates to NIST’s Digital Identity Guidelines: SP 800-63-3
    Technology moves fast - the guidelines for securing “digital identities” is already four years old; old enough to be replaced by the National Institute of Science and Technology (NIST). The new, final Special Publication (SP) 800-63-3 was released at the end of June. Last July, I wrote about how NIST deemed SMS-based two-factor authentication as no longer secure in their initial draft of the Digi...
Duo Security
Duo Security
YouTube Video

New YouTube videos detected.

  • Dug Song on Duo Beyond
    Duo Beyond allows you to identify corporate vs. personal devices with easy certificate deployment, block untrusted endpoints, and give your users secure access to internal applications without using VPNs. Learn more in this white paper: duo.sc/beyond-part2 More about Duo Beyond: duo.sc/beyond
Duo Security
Duo Security
YouTube Video

New YouTube videos detected.

  • Jon Oberheide on Duo Beyond
    Duo Beyond allows you to identify corporate vs. personal devices with easy certificate deployment, block untrusted endpoints, and give your users secure access to internal applications without using VPNs. Learn more in this white paper: duo.sc/beyond-part2 More about Duo Beyond: duo.sc/beyond
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • Where to Find Duo at BSides, Black Hat & DEF CON 25
    If you’re heading to Las Vegas for a week of back-to-back conferences, well, we are too. And we’ll be there with new tool demos, book signing, plus several parties & awesome DJs. Check out Duo in Las Vegas for a full list of our events and where you can find us. BSides BSides is a community-driven information security conference held in 100 cities across 26 countries, with the Las Vegas event ...
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • Moving Beyond the Perimeter: Part 2
    In part 1 of our white paper series, Duo’s Principal Security Strategist Wendy Nather explained the theory behind Google’s BeyondCorp security model - a new approach to enterprise security that mitigates the risks resulting from placing too much trust in the internal network. In part 2, Moving Beyond the Perimeter: How to Implement the BeyondCorp Security Model, Wendy describes how you can build ...
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • Genius Doesn't Have to Come at the Cost of Kindness or Happiness: Why I Joined Duo
    For the last 18 years, every role I’ve committed to and every job I’ve had has helped shape who I am and taught me to be stronger. I’ve had great mentors who lifted me up through tough times, but there was always a whisper in my ear, a gut feeling that kept pushing me to find a place where I could express myself, be comfortable in my own skin and grow without restrictions. Just as I was starting ...
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • Security Hygiene Tips to Prevent Malware Infection & Stop Lateral Movement
    Malware, ransomware, wipers, whatever you want to call them, they’re quite adept at spreading - whether across the web or laterally across your internal network. From stopping the initial point of infection to narrowing its path of destruction, here are some tips from the US-CERT (United States Computer Emergency Readiness Team) to help organizations of all sizes stay safe: Infection Prevention ...
Duo Security
Duo Security
Blog Post

New blog articles detected.

  • Moving Beyond the Perimeter: Part 1
    In Duo’s latest white paper, Principal Security Strategist Wendy Nather explains the theory behind Google’s BeyondCorp security model, the different components required and the overall security architecture. This white paper is part 1 of 2 in the Moving Beyond the Perimeter series. In part 2, we’ll describe how to implement the security model within your organization. Why the Need for a New Secu...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.