The Duo Bulletin

Visit Duo at RSAC 2015 for Security Demos + Drone Giveaway!

Duo Security will be attending and exhibiting at the 2015 RSA Conference (RSAC) held in San Francisco at the Moscone center from April 20-24!
Read more...

A Look at the InfoSec of Wall Street's Third-Party Vendors

Wall Street has a ways to go when it comes to ensuring the information security of vendors it does business with.
Read more...

Duo Security: Making Advanced Security Available to All

Today we are excited to announce that Redpoint is leading a growth investment in Duo Security, an emerging leader in the two-factor authentication market.
Read more...

Announcing Duo Platform Edition: Expanding Beyond Two-Factor Authentication To Secure Access

Today is an exciting day for us at Duo. We are evolving from delivering a great two-factor authentication product to now delivering a secure access platform. We are announcing our most comprehensive edition yet, Duo Platform Edition.
Read more...

What's Next for Security and Duo?

It’s a huge day for us at Duo -- we’re announcing the forthcoming release of Duo Platform Edition and we’re thrilled to tell the world about our latest round of funding, led by Redpoint Ventures.
Read more...

The Evolution of Security #9: One Solution to Secure It All

Information security has, by necessity, changed a lot from a strategic perspective. Check out Duo's series of illustrations depicting security throughout the ages, and learn more about Duo Platform Edition!
Read more...

Duo Hosts Security Summit Featuring Speakers from Google, Palantir, Microsoft & More

Duo Security will be attending and exhibiting at the RSA Conference again this year, from April 20-24, 2015. That same week we’ll also be hosting a gathering of information security professionals in San Francisco - The Duo Security Summit.
Read more...

The Evolution of Security #8: Cloud & BYOD (Bring Your Own Device)

Information security has, by necessity, changed a lot from a strategic perspective. Check out Duo's series of illustrations depicting security throughout the ages, and stay tuned for our April 14 announcement!
Read more...

The Weekly Ink #31

The Weekly Ink is the weekly newsletter brought to you by Duo Labs, with curated links of interest in the security world to help educate the company - and anyone else who will listen - on security happenings and culture.
Read more...

The Evolution of Security #7: Remote Workers

Information security has, by necessity, changed a lot from a strategic perspective. Check out Duo's series of illustrations depicting security throughout the ages, and stay tuned for our April 14 announcement!
Read more...

UK Banking Fraud Losses on the Rise

In the U.K., remote banking fraud losses have risen 42 percent, while online banking fraud has increased 48 percent, according to the Financial Fraud Action UK (FFA UK).
Read more...

The Evolution of Security #6: Local Only

Information security has, by necessity, changed a lot from a strategic perspective. Check out Duo's series of illustrations depicting security throughout the ages, and stay tuned for our April 14 announcement!
Read more...

The Evolution of Security #5: The Mainframe

Information security has, by necessity, changed a lot from a strategic perspective. Check out Duo's series of illustrations depicting security throughout the ages, and stay tuned for our April 14 announcement!
Read more...

Banking Malware Targets Wire Transfers; Evades Antivirus

The Trojan Dyre (also known as Dyreza) has been around for quite awhile now, terrorizing the banking industry, stealing passwords and enabling malicious hackers to make off with money stolen directly from individual accounts. Now IBM security researchers are reporting on a recent campaign they’ve dubbed, “The Dyre Wolf” that leverages social engineering to steal account information and money from corporate accounts - resulting in higher payoffs.
Read more...

The Evolution of Security #4: Two-Man Rule

Information security has, by necessity, changed a lot from a strategic perspective. Check out Duo's series of illustrations depicting security throughout the ages, and stay tuned for our April 14 announcement!
Read more...

Categories

Free Guide

Two-Factor Authentication Evaluation Guide

This guide walks through some of the key areas of differentiation between two-factor authentication solutions and provides some concrete criteria for evaluating technologies and vendors.

Tags

phishing (16)  two-factor-authentication (15)  passwords (13)  healthcare security (12)  infosec-evolution (9)  cloud security (8)  security news (8)  banking security (7)  malware (7)  ooba (6)  financial institutions (6)  financial data breach (6)  atms (5)  stolen credentials (5)  federal cybersecurity (5)  2fa (5)  stolen-passwords (5)  webinar (5)  retail data breaches (5)  transaction-level 2fa (5)  encryption (5)  retail (4)  healthcare cybersecurity (4)  data breach notification (4)  data breaches (4)  hipaa (4)  healthit (4)  weekly ink (4)  pci dss (4)  bank security (4)  health it (3)  target (3)  rig exploit kit (3)  pos malware (3)  strong-authentication (3)  otp bypass (3)  critical infrastructure security (3)  third-party security (3)  vulnerability (3)  twitter (3)  medical devices (3)  defense in depth (3)  manufacturing security (3)  retail ebook (3)  home depot (3)  remote access security (3)  two-factor (3)  anthem (3)  iot security (3)  mobile security (3)  e-prescriptions (3)  hipaa security rule (3) 

Duo is hiring!

View our open positions

Follow Us

Subscribe to our Newsletter

Get product updates, interesting content, and invitations to online and live events.