Announcing the agenda for TC Sessions: Enterprise | San Francisco, September 5

TechCrunch Sessions is back! On September 5, we’re taking on the ferociously competitive field of enterprise software, and thrilled to announce our packed agenda, overflowing with some of the biggest names and most exciting startups in the enterprise industry. And you’re in luck, because $249 early-bird tickets are still on sale — make sure you […] Continue reading Announcing the agenda for TC Sessions: Enterprise | San Francisco, September 5

Enterprises catching up with the explosion of cloud use and shadow IT in the workplace

Businesses worldwide are gaining control of previously unmonitored and unsupported cloud applications and devices, known as shadow IT, that lurk in their IT environments, according to the 2019 Duo Trusted Access Report. The average number of organizati… Continue reading Enterprises catching up with the explosion of cloud use and shadow IT in the workplace

Photo gallery: RSA Conference 2019 Expo, part two

RSA Conference 2019 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Here are a few photos from the Expo floor. Featured vendors include: DigiCert, Anomali, iovation, Netspa… Continue reading Photo gallery: RSA Conference 2019 Expo, part two

How WebAuthn aims to solve the password problem

One of the most pervasive challenges in cybersecurity is the balancing act between protection and usability. Security measures have to prevent malicious actors from accessing essential systems and data but must not be a barrier to legitimate users. Whi… Continue reading How WebAuthn aims to solve the password problem

Should you trust that Chrome extension? Use CRXcavator to decide

Duo Security has released CRXcavator, a tool that can help end users and enterprises make an informed decision about installing a specific Chrome extension. About CRXcavator CRXcavator was created as an internal tool by Duo’s Corporate Security Enginee… Continue reading Should you trust that Chrome extension? Use CRXcavator to decide

This tool allows you to check the code powering Chrome extensions

Browser extensions, like any other piece of software, can be abused or manipulated by hackers for malicious purposes. Duo Security wants to make it harder for that to happen. The company on Thursday released a beta version of a tool, CRXcavator, that screens extensions for Google Chrome, the world’s most popular web browser, for malicious code. “As our portal to the internet, browsers represent what is likely the largest common attack surface across consumers and businesses alike,” the Cisco-owned company said in a blog post. Extensions are handy for navigating the web, and some even offer important security features, but they can also allow third parties access a lot of user data. The new tool takes a stab at that security challenge by letting a user enter a Chrome extension and then returning a risk score for the application based on the permissions it grants on a computer. Tracking the third-party code used by an […]

The post This tool allows you to check the code powering Chrome extensions appeared first on CyberScoop.

Continue reading This tool allows you to check the code powering Chrome extensions

Case study: Why Duo chose Signal Sciences to provide security visibility and blocking

Duo customers trust its platform to support the scale and frequency of billions of authentication requests across the globe every week. Duo’s security team needed to see and secure this traffic without negatively impacting user experience or introducin… Continue reading Case study: Why Duo chose Signal Sciences to provide security visibility and blocking

New additions to RSA Conference Advisory Board bring wealth of industry knowledge

RSA Conference, the world’s leading information security conferences and expositions, today announced the addition of nine new members to its Advisory Board for a total of 16 members across a wide array of positions in the industry. This expansion fall… Continue reading New additions to RSA Conference Advisory Board bring wealth of industry knowledge

Security controls that verify users and devices protect agencies from insider threats

Zero-trust security models are helping large organizations to protect against malicious users, including those who have already infiltrated their networks, a new report says. Government agencies will benefit from stricter security controls if they shift to a zero-trust approach, according to experts from Duo Security. Zero trust assumes from the outset that all users and data traffic are operating in an open and unsecured environment. The focus on security then shifts to giving authorized users access to designated applications and data based on their identity and to devices based on their level of trustworthiness. “Achieving Zero-Trust Security in Federal Agencies” breaks down the methods to build zero-trust practices, including continuous authentication, device assessment, user controls and application access. Continuous authentication is a user-specific approach that doesn’t rely on privacy-protected information. The security environment protects from threats by taking note of typical behaviors and then denying access when it senses off-pattern […]

The post Security controls that verify users and devices protect agencies from insider threats appeared first on Cyberscoop.

Continue reading Security controls that verify users and devices protect agencies from insider threats