Search for blog posts, documentation, or pages

The Duo Bulletin

Duolytics: Four Years with Four Factors

"D" is for Data; that's good enough for me! Here at Duo Labs, we’ve been busy slicing and dicing the usage data that we’ve collected over the years, so let's talk about what actual usage of 2FA looks like. This is the first of a series of discussions that we want to present based on our available insights into usage, devices, and applications involved in the Duo workflow.

A New, Simplified Admin Panel

As Duo continues to expand its functionality and product offerings, we remain dedicated to innovation in the realm of usability. Today, we are demonstrating that by releasing a redesigned and simplified Duo Admin Panel.

Data Breach Lawsuits Revived: Court Turns in Favor of Consumers

A data breach may be in the news one week and out the other, but the real lasting business impact and consumer effects can be felt long after the fact, as the recent reinstatement of a lawsuit tied to the Neiman Marcus breach of January 2014 proves.

Mitigating Effects of the Hacking Team Fallout

The effects of the Hacking Team hack are still being felt, but some are trying to help organizations do some damage control and look for signs of infection from their spyware.

The Essential Guide to Securing Remote Access

How can you protect your company against remote access attacks? Find out how by downloading The Essential Guide to Securing Remote Access: Preventing Data Breaches With Strong Authentication from Duo Security.

Hacking Team Data Leak: Software Vendors Release Fixes; Others Comb Through Emails

This week, Adobe, Oracle and Microsoft patched for several critical vulnerabilities found in the 400GB dump of Hacking Team’s intellectual property and proprietary exploit code that some researchers are still combing through.

FTC Releases 10 Data Security Guidelines

The Federal Trade Commission (FTC) has released a list of data security guidelines gleaned from the agency’s 50+ data security settlements.

Majority of Healthcare Security Incidents Involve External Actors, Phishing Attacks

A new survey from HIMSS (Healthcare Information and Management Systems Society) found that 87 percent of healthcare officials rate information security as an increasing business priority. Another two-thirds reported that their organization had experienced a significant security incident.

U.K. Bank Customers Targeted With Phishing Campaign and Malware

Dyre - oh, Dyre; the banking Trojan we love to hate - is sticking around, as a recent phishing campaign against U.K. banks revealed.

Duo Labs Great DEF CON Giveaway!

Want to go to DEF CON but don’t want to spend money you could otherwise lose gambling in Vegas? Do you want to avoid standing in an epic lineup of hackers just to get your DEF CON pass? Duo Labs wants to help you out. For the small price of some attention on Twitter, three lucky people will receive free passes from Duo Security to DEF CON 23.

International Spyware Company Hacked: Flash Exploits Sold to Intel Agencies

The irony is quite strong in this one: Italy-based Hacking Team, an international spyware company that provides surveillance technology to government agencies, was hacked. Five hundred gigabytes of internal data was published as a Torrent file on Sunday evening, in addition to a full list of the company’s clients on Pastebin.

Media Streaming Service Hacked; No Support for Two-Factor Authentication

Plex, a media streaming service, announced that their forum and blog servers were hacked - meaning your email address, IP address, forum messages and encrypted (hashed and salted) password may have been stolen. As of now, their forums are offline while they investigate.

Credential-Harvesting Malware Focuses on Financial Services

Financial losses associated with security incidents have increased 24 percent in 2014 in the finance sector, with overall detected security incidents increasing 8 percent, according to PricewaterhouseCoopers’ Global State of Information Security Survey: Financial Services.

New OPM Security Strategy Expands Monitoring and Widens Two-Factor Deployment

While there’s plenty of dismal news unraveling in the wake of the epic OPM breach, there’s a lot of positive learning to be had as well. The agency released an OPM Cybersecurity Action Report outlining specific steps they planned to take to remediate and strengthen their internal security posture.

Zero-Day Phishing Campaign Targets High Tech Intellectual Property

A large-scale phishing campaign leveraging a critical Adobe Flash zero-day has been targeting many different industries for weeks, including aerospace and defense, construction and engineering, high tech, telecommunications and transportation organizations.


Free Guide

Security for an Age of Zero Trust

Think your organization is ready for the cloud and decentralized security? Download this white paper to learn why you may not be.


phishing (18)  security news (17)  two-factor-authentication (15)  healthcare security (15)  passwords (14)  weekly ink (13)  federal cybersecurity (10)  malware (9)  infosec-evolution (9)  cloud security (9)  banking security (8)  rsac2015 (8)  retail data breaches (8)  duo mobile (7)  stolen-passwords (6)  financial institutions (6)  financial data breach (6)  2fa (6)  ooba (6)  pci dss (6)  data breaches (6)  encryption (5)  atms (5)  webinar (5)  transaction-level 2fa (5)  stolen credentials (5)  third-party security (4)  financial data security (4)  retail data security (4)  bank security (4)  data breach notification (4)  hipaa (4)  healthit (4)  vulnerability (4)  pos malware (4)  medical identity theft (4)  remote access security (4)  healthcare cybersecurity (4)  mobile security (4)  retail (4)  uk security (3)  anthem (3)  iot security (3)  defense in depth (3)  security threats (3)  dyre trojan (3)  rig exploit kit (3)  otp bypass (3)  payment card breach (3)  2-factor-authentication (3)  media security (3)  law firm security (3)  ffiec (3)  twitter (3)  remote access attacks (3)  retail data risks (3)  ssl (3)  critical infrastructure security (3)  manufacturing security (3)  strong-authentication (3)  target (3)  platform edition (3)  health it (3)  two-factor (3)  home depot (3)  retail ebook (3)  e-prescriptions (3)  hipaa security rule (3)  higher education (3)  google (3) 

Duo is hiring!

View our open positions

Subscribe to our Newsletter

Get product updates, interesting content, and invitations to online and live events.