Beyond MFA: Device Visibility, Trust & Secure Remote Access
Going beyond multi-factor authentication (MFA) means adding controls and checks to secure the other harbinger of malware and risks to your network - devices, also referred to as endpoints.
Going beyond multi-factor authentication (MFA) means adding controls and checks to secure the other harbinger of malware and risks to your network - devices, also referred to as endpoints.
We've released a set of analytics enhancements to the Duo dashboard to help our customers find information and enable better security analysis; including three new authentication and deployment reports, and an update to our Authentication Log.
Duo's security team explores how the T2 coprocessor is being used by Apple and how it fits into the larger system security model, as well as how this may evolve in the future.
Ugh, passwords. There's got to be a better way - learn more about industry advancements in passwordless authentication, multi-factor authentication (U2F and Duo Push), WebAuthn and more.
We're launching Duo's Technology Partner Program - an easy way to partner with Duo and get access to our network of customers and resellers, allowing you to build and collaborate with hundreds of other developers on the Duo platform.
We analyzed the security of several third-party AWS S3 tools to find out why so many S3 buckets with sensitive information have been made public, seemingly unintentionally. Here's what we found.
The top malware infection vector is our age-old friend, phishing, while stolen credentials are popular for lateral movement - see more insights from Symantec's latest Internet Security Threat Report.
Duo Labs security researchers show how to bypass microcontroller interfaces used for internet of things (IoT) devices - these invasive attacks require physical access to typical microcontrollers.
In February, Duo released CloudMapper, an AWS environment visualization tool, to the developer community. In this blog post, we explore several potential misconfigurations that can lead to security problems.
Duo Labs performed an analysis of Objective-C binaries running on managed macOS endpoints in enterprise environments, using the Interactive Disassembler (IDA Pro) to perform disassembly and decompilation of the binaries.