際際滷shows by User: duosecurity / http://www.slideshare.net/images/logo.gif 際際滷shows by User: duosecurity / Wed, 13 May 2015 14:13:57 GMT 際際滷Share feed for 際際滷shows by User: duosecurity Security Fact & Fiction: Three Lessons from the Headlines /slideshow/newmind-preso/48101954 newmindpreso-150513141357-lva1-app6892
Real-word breaches are often caused by simple lapses of judgment. Hollywood movies and some of the media representations of data breaches are sensationalized and over-complicated compared to reality.]]>

Real-word breaches are often caused by simple lapses of judgment. Hollywood movies and some of the media representations of data breaches are sensationalized and over-complicated compared to reality.]]>
Wed, 13 May 2015 14:13:57 GMT /slideshow/newmind-preso/48101954 duosecurity@slideshare.net(duosecurity) Security Fact & Fiction: Three Lessons from the Headlines duosecurity Real-word breaches are often caused by simple lapses of judgment. Hollywood movies and some of the media representations of data breaches are sensationalized and over-complicated compared to reality. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/newmindpreso-150513141357-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Real-word breaches are often caused by simple lapses of judgment. Hollywood movies and some of the media representations of data breaches are sensationalized and over-complicated compared to reality.
Security Fact & Fiction: Three Lessons from the Headlines from Duo Security
]]>
680 2 https://cdn.slidesharecdn.com/ss_thumbnails/newmindpreso-150513141357-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing Access to PeopleSoft ERP with Duo Security and GreyHeller /slideshow/securing-access-to-peoplesoft-erp-with-duo-security-and-greyheller/45707143 duogreyhellerwebinar-final2015-01-21-150311090929-conversion-gate01
Learn how to add two-factor authentication to secure remote access for employees, staff, partners, and customers that need to access PeopleSoft at your organization.]]>

Learn how to add two-factor authentication to secure remote access for employees, staff, partners, and customers that need to access PeopleSoft at your organization.]]>
Wed, 11 Mar 2015 09:09:29 GMT /slideshow/securing-access-to-peoplesoft-erp-with-duo-security-and-greyheller/45707143 duosecurity@slideshare.net(duosecurity) Securing Access to PeopleSoft ERP with Duo Security and GreyHeller duosecurity Learn how to add two-factor authentication to secure remote access for employees, staff, partners, and customers that need to access PeopleSoft at your organization. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/duogreyhellerwebinar-final2015-01-21-150311090929-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn how to add two-factor authentication to secure remote access for employees, staff, partners, and customers that need to access PeopleSoft at your organization.
Securing Access to PeopleSoft ERP with Duo Security and GreyHeller from Duo Security
]]>
1397 4 https://cdn.slidesharecdn.com/ss_thumbnails/duogreyhellerwebinar-final2015-01-21-150311090929-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How To Stop Targeted Attacks And Avoid Expense In Depth With Strong Authentication /slideshow/how-to-stop-targeted-attacks-and-avoid-expense-in-depth-with-strong-authentication-duo-security-forrester/41672434 duoforresterutkwebinarwithrickholland2014-09-25final-141117152347-conversion-gate02
Presenters: Rick Holland, Principal Analyst, Forrester Research Brian Kelly, Principal PMM, Duo Security Bob Hillhouse, Associate CIO and CISO, University of Tennessee, Knoxville]]>

Presenters: Rick Holland, Principal Analyst, Forrester Research Brian Kelly, Principal PMM, Duo Security Bob Hillhouse, Associate CIO and CISO, University of Tennessee, Knoxville]]>
Mon, 17 Nov 2014 15:23:47 GMT /slideshow/how-to-stop-targeted-attacks-and-avoid-expense-in-depth-with-strong-authentication-duo-security-forrester/41672434 duosecurity@slideshare.net(duosecurity) How To Stop Targeted Attacks And Avoid Expense In Depth With Strong Authentication duosecurity Presenters: Rick Holland, Principal Analyst, Forrester Research Brian Kelly, Principal PMM, Duo Security Bob Hillhouse, Associate CIO and CISO, University of Tennessee, Knoxville <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/duoforresterutkwebinarwithrickholland2014-09-25final-141117152347-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presenters: Rick Holland, Principal Analyst, Forrester Research Brian Kelly, Principal PMM, Duo Security Bob Hillhouse, Associate CIO and CISO, University of Tennessee, Knoxville
How To Stop Targeted Attacks And Avoid Expense In Depth With Strong Authentication from Duo Security
]]>
658 5 https://cdn.slidesharecdn.com/ss_thumbnails/duoforresterutkwebinarwithrickholland2014-09-25final-141117152347-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong /slideshow/forrester-and-duo-security-webinar-5-signs-youre-doing-authentication-wrong/38030271 duoforresterccwebinarccslidesfinal2014-03-25-140815120603-phpapp01
If you're like many IT security professionals, you're on a quest to do a better job of authenticating users in the face of new security and business challenges. Have you gotten caught up in one of five authentication traps, like many of your peers? Full replay of the recording is available online: https://go.duosecurity.com/Forrester_Webinar_Signs_Youre_Doing_Authentication_Wrong.html In this webinar, you will learn: * Five signs you're doing authentication wrong * Forrester research on key trends and generational shifts in the authentication market * How to assess solution usability, deployability and security * Will it ever be truly possible to "kill the password?" Join the following guest speakers as they comment on the virtues of a thoughtfully deployed authentication solution. * Eve Maler, Forrester Research * Brian Kelly, Duo Security * Daniel Frye, CedarCrestone]]>

If you're like many IT security professionals, you're on a quest to do a better job of authenticating users in the face of new security and business challenges. Have you gotten caught up in one of five authentication traps, like many of your peers? Full replay of the recording is available online: https://go.duosecurity.com/Forrester_Webinar_Signs_Youre_Doing_Authentication_Wrong.html In this webinar, you will learn: * Five signs you're doing authentication wrong * Forrester research on key trends and generational shifts in the authentication market * How to assess solution usability, deployability and security * Will it ever be truly possible to "kill the password?" Join the following guest speakers as they comment on the virtues of a thoughtfully deployed authentication solution. * Eve Maler, Forrester Research * Brian Kelly, Duo Security * Daniel Frye, CedarCrestone]]>
Fri, 15 Aug 2014 12:06:03 GMT /slideshow/forrester-and-duo-security-webinar-5-signs-youre-doing-authentication-wrong/38030271 duosecurity@slideshare.net(duosecurity) Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong duosecurity If you're like many IT security professionals, you're on a quest to do a better job of authenticating users in the face of new security and business challenges. Have you gotten caught up in one of five authentication traps, like many of your peers? Full replay of the recording is available online: https://go.duosecurity.com/Forrester_Webinar_Signs_Youre_Doing_Authentication_Wrong.html In this webinar, you will learn: * Five signs you're doing authentication wrong * Forrester research on key trends and generational shifts in the authentication market * How to assess solution usability, deployability and security * Will it ever be truly possible to "kill the password?" Join the following guest speakers as they comment on the virtues of a thoughtfully deployed authentication solution. * Eve Maler, Forrester Research * Brian Kelly, Duo Security * Daniel Frye, CedarCrestone <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/duoforresterccwebinarccslidesfinal2014-03-25-140815120603-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> If you&#39;re like many IT security professionals, you&#39;re on a quest to do a better job of authenticating users in the face of new security and business challenges. Have you gotten caught up in one of five authentication traps, like many of your peers? Full replay of the recording is available online: https://go.duosecurity.com/Forrester_Webinar_Signs_Youre_Doing_Authentication_Wrong.html In this webinar, you will learn: * Five signs you&#39;re doing authentication wrong * Forrester research on key trends and generational shifts in the authentication market * How to assess solution usability, deployability and security * Will it ever be truly possible to &quot;kill the password?&quot; Join the following guest speakers as they comment on the virtues of a thoughtfully deployed authentication solution. * Eve Maler, Forrester Research * Brian Kelly, Duo Security * Daniel Frye, CedarCrestone
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong from Duo Security
]]>
1532 7 https://cdn.slidesharecdn.com/ss_thumbnails/duoforresterccwebinarccslidesfinal2014-03-25-140815120603-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A Place to Hang Our Hats: Security Community and Culture by Domenic Rizzolo /slideshow/a-place-to-hang-our-hats/37926572 bsidesprezo-140812152713-phpapp02
Contrary to popular belief and media depictions, hacking is a social endeavor. By examining the evolution of various hacking groups and collectives over the years, we can glean valuable insight into the structure of todays hacking space and security culture. From white hat companies to prison, we look at how innovation in exploits and anonymity have reformed and regrouped the hacking clubs of yore. DOMENIC RIZZOLO DUO SECURITY Domenic Rizzolo is a Security Research Intern in the Duo Labs division of Duo Security, studying Math and Complex Systems at the University of Michigan. Hes very interested in what exploring security and hacking culture from an historical context can tell us about modern security issues. He has no hat, as he is a very recent addition to the Duo Security team and the infosec community. Generally, he is interested in analytic solutions to social science problems.]]>

Contrary to popular belief and media depictions, hacking is a social endeavor. By examining the evolution of various hacking groups and collectives over the years, we can glean valuable insight into the structure of todays hacking space and security culture. From white hat companies to prison, we look at how innovation in exploits and anonymity have reformed and regrouped the hacking clubs of yore. DOMENIC RIZZOLO DUO SECURITY Domenic Rizzolo is a Security Research Intern in the Duo Labs division of Duo Security, studying Math and Complex Systems at the University of Michigan. Hes very interested in what exploring security and hacking culture from an historical context can tell us about modern security issues. He has no hat, as he is a very recent addition to the Duo Security team and the infosec community. Generally, he is interested in analytic solutions to social science problems.]]>
Tue, 12 Aug 2014 15:27:13 GMT /slideshow/a-place-to-hang-our-hats/37926572 duosecurity@slideshare.net(duosecurity) A Place to Hang Our Hats: Security Community and Culture by Domenic Rizzolo duosecurity Contrary to popular belief and media depictions, hacking is a social endeavor. By examining the evolution of various hacking groups and collectives over the years, we can glean valuable insight into the structure of todays hacking space and security culture. From white hat companies to prison, we look at how innovation in exploits and anonymity have reformed and regrouped the hacking clubs of yore. DOMENIC RIZZOLO DUO SECURITY Domenic Rizzolo is a Security Research Intern in the Duo Labs division of Duo Security, studying Math and Complex Systems at the University of Michigan. Hes very interested in what exploring security and hacking culture from an historical context can tell us about modern security issues. He has no hat, as he is a very recent addition to the Duo Security team and the infosec community. Generally, he is interested in analytic solutions to social science problems. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bsidesprezo-140812152713-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Contrary to popular belief and media depictions, hacking is a social endeavor. By examining the evolution of various hacking groups and collectives over the years, we can glean valuable insight into the structure of todays hacking space and security culture. From white hat companies to prison, we look at how innovation in exploits and anonymity have reformed and regrouped the hacking clubs of yore. DOMENIC RIZZOLO DUO SECURITY Domenic Rizzolo is a Security Research Intern in the Duo Labs division of Duo Security, studying Math and Complex Systems at the University of Michigan. Hes very interested in what exploring security and hacking culture from an historical context can tell us about modern security issues. He has no hat, as he is a very recent addition to the Duo Security team and the infosec community. Generally, he is interested in analytic solutions to social science problems.
A Place to Hang Our Hats: Security Community and Culture by Domenic Rizzolo from Duo Security
]]>
477 5 https://cdn.slidesharecdn.com/ss_thumbnails/bsidesprezo-140812152713-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by Mark Stanislav and Zach Lanier /slideshow/internet-of-fails-where-iot-has-gone-wrong-and-how-were-making-it-right/37916465 internetoffails-140812103908-phpapp01
This presentation will dive into research, outcomes, and recommendations regarding information security for the "Internet of Things". Mark and Zach will discuss IoT security failures both from their own research as well as the work of people they admire. Attendees are invited to laugh/cringe at concerning examples of improper access control, a complete lack of transport security, hardcoded-everything, and ways to bypass paying for stuff. Mark and Zach will also discuss the progress that their initiative, BuildItSecure.ly, has made since it was announced this past February at B-Sides San Francisco. Based on their own struggles with approaching smaller technology vendors with bugs and trying to handle coordinated disclosure, Mark and Zach decided to change the process and dialog that was occurring into one that is inclusive, friendly, researcher-centric. They will provide results and key learnings about the establishment of this loose organization of security-minded vendors, partners, and researchers who have decided to focus on improving information security for bootstrapped/crowd-funded IoT products and platforms. If you're a researcher who wants to know more about attacking this space, an IoT vendor trying to refine your security processes, or just a consumer who cares about their own safety and privacy, this talk will provide some great insights to all of those ends. MARK STANISLAV DUO SECURITY Mark Stanislav is the Security Evangelist for Duo Security. With a career spanning over a decade, Mark has worked within small business, academia, startup and corporate environments, primarily focused on Linux architecture, information security, and web application development. He has presented at over 70 events internationally including RSA, ShmooCon, SOURCE Boston, and THOTCON. His security research has been featured on web sites including CSO Online, Security Ledger, and Slashdot. Mark holds a B.S. in Networking & IT Administration and an M.S. in Information Assurance, both from Eastern Michigan University. Mark is currently writing a book titled, "Two-Factor Authentication" (published by IT Governance). ZACH LANIER DUO SECURITY Zach Lanier is a Security Researcher with Duo Security, specializing in various bits of network, mobile, and application security. Prior to joining Duo, Zach most recently served as a Senior Research Scientist with Accuvant LABS. He has spoken at a variety of security conferences, such as Black Hat, CanSecWest, INFILTRATE, ShmooCon, and SecTor, and is a co-author of the recently published "Android Hackers' Handbook."]]>

This presentation will dive into research, outcomes, and recommendations regarding information security for the "Internet of Things". Mark and Zach will discuss IoT security failures both from their own research as well as the work of people they admire. Attendees are invited to laugh/cringe at concerning examples of improper access control, a complete lack of transport security, hardcoded-everything, and ways to bypass paying for stuff. Mark and Zach will also discuss the progress that their initiative, BuildItSecure.ly, has made since it was announced this past February at B-Sides San Francisco. Based on their own struggles with approaching smaller technology vendors with bugs and trying to handle coordinated disclosure, Mark and Zach decided to change the process and dialog that was occurring into one that is inclusive, friendly, researcher-centric. They will provide results and key learnings about the establishment of this loose organization of security-minded vendors, partners, and researchers who have decided to focus on improving information security for bootstrapped/crowd-funded IoT products and platforms. If you're a researcher who wants to know more about attacking this space, an IoT vendor trying to refine your security processes, or just a consumer who cares about their own safety and privacy, this talk will provide some great insights to all of those ends. MARK STANISLAV DUO SECURITY Mark Stanislav is the Security Evangelist for Duo Security. With a career spanning over a decade, Mark has worked within small business, academia, startup and corporate environments, primarily focused on Linux architecture, information security, and web application development. He has presented at over 70 events internationally including RSA, ShmooCon, SOURCE Boston, and THOTCON. His security research has been featured on web sites including CSO Online, Security Ledger, and Slashdot. Mark holds a B.S. in Networking & IT Administration and an M.S. in Information Assurance, both from Eastern Michigan University. Mark is currently writing a book titled, "Two-Factor Authentication" (published by IT Governance). ZACH LANIER DUO SECURITY Zach Lanier is a Security Researcher with Duo Security, specializing in various bits of network, mobile, and application security. Prior to joining Duo, Zach most recently served as a Senior Research Scientist with Accuvant LABS. He has spoken at a variety of security conferences, such as Black Hat, CanSecWest, INFILTRATE, ShmooCon, and SecTor, and is a co-author of the recently published "Android Hackers' Handbook."]]>
Tue, 12 Aug 2014 10:39:08 GMT /slideshow/internet-of-fails-where-iot-has-gone-wrong-and-how-were-making-it-right/37916465 duosecurity@slideshare.net(duosecurity) Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by Mark Stanislav and Zach Lanier duosecurity This presentation will dive into research, outcomes, and recommendations regarding information security for the "Internet of Things". Mark and Zach will discuss IoT security failures both from their own research as well as the work of people they admire. Attendees are invited to laugh/cringe at concerning examples of improper access control, a complete lack of transport security, hardcoded-everything, and ways to bypass paying for stuff. Mark and Zach will also discuss the progress that their initiative, BuildItSecure.ly, has made since it was announced this past February at B-Sides San Francisco. Based on their own struggles with approaching smaller technology vendors with bugs and trying to handle coordinated disclosure, Mark and Zach decided to change the process and dialog that was occurring into one that is inclusive, friendly, researcher-centric. They will provide results and key learnings about the establishment of this loose organization of security-minded vendors, partners, and researchers who have decided to focus on improving information security for bootstrapped/crowd-funded IoT products and platforms. If you're a researcher who wants to know more about attacking this space, an IoT vendor trying to refine your security processes, or just a consumer who cares about their own safety and privacy, this talk will provide some great insights to all of those ends. MARK STANISLAV DUO SECURITY Mark Stanislav is the Security Evangelist for Duo Security. With a career spanning over a decade, Mark has worked within small business, academia, startup and corporate environments, primarily focused on Linux architecture, information security, and web application development. He has presented at over 70 events internationally including RSA, ShmooCon, SOURCE Boston, and THOTCON. His security research has been featured on web sites including CSO Online, Security Ledger, and Slashdot. Mark holds a B.S. in Networking & IT Administration and an M.S. in Information Assurance, both from Eastern Michigan University. Mark is currently writing a book titled, "Two-Factor Authentication" (published by IT Governance). ZACH LANIER DUO SECURITY Zach Lanier is a Security Researcher with Duo Security, specializing in various bits of network, mobile, and application security. Prior to joining Duo, Zach most recently served as a Senior Research Scientist with Accuvant LABS. He has spoken at a variety of security conferences, such as Black Hat, CanSecWest, INFILTRATE, ShmooCon, and SecTor, and is a co-author of the recently published "Android Hackers' Handbook." <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/internetoffails-140812103908-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation will dive into research, outcomes, and recommendations regarding information security for the &quot;Internet of Things&quot;. Mark and Zach will discuss IoT security failures both from their own research as well as the work of people they admire. Attendees are invited to laugh/cringe at concerning examples of improper access control, a complete lack of transport security, hardcoded-everything, and ways to bypass paying for stuff. Mark and Zach will also discuss the progress that their initiative, BuildItSecure.ly, has made since it was announced this past February at B-Sides San Francisco. Based on their own struggles with approaching smaller technology vendors with bugs and trying to handle coordinated disclosure, Mark and Zach decided to change the process and dialog that was occurring into one that is inclusive, friendly, researcher-centric. They will provide results and key learnings about the establishment of this loose organization of security-minded vendors, partners, and researchers who have decided to focus on improving information security for bootstrapped/crowd-funded IoT products and platforms. If you&#39;re a researcher who wants to know more about attacking this space, an IoT vendor trying to refine your security processes, or just a consumer who cares about their own safety and privacy, this talk will provide some great insights to all of those ends. MARK STANISLAV DUO SECURITY Mark Stanislav is the Security Evangelist for Duo Security. With a career spanning over a decade, Mark has worked within small business, academia, startup and corporate environments, primarily focused on Linux architecture, information security, and web application development. He has presented at over 70 events internationally including RSA, ShmooCon, SOURCE Boston, and THOTCON. His security research has been featured on web sites including CSO Online, Security Ledger, and Slashdot. Mark holds a B.S. in Networking &amp; IT Administration and an M.S. in Information Assurance, both from Eastern Michigan University. Mark is currently writing a book titled, &quot;Two-Factor Authentication&quot; (published by IT Governance). ZACH LANIER DUO SECURITY Zach Lanier is a Security Researcher with Duo Security, specializing in various bits of network, mobile, and application security. Prior to joining Duo, Zach most recently served as a Senior Research Scientist with Accuvant LABS. He has spoken at a variety of security conferences, such as Black Hat, CanSecWest, INFILTRATE, ShmooCon, and SecTor, and is a co-author of the recently published &quot;Android Hackers&#39; Handbook.&quot;
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by Mark Stanislav and Zach Lanier from Duo Security
]]>
1720 5 https://cdn.slidesharecdn.com/ss_thumbnails/internetoffails-140812103908-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security For The People: End-User Authentication Security on the Internet by Mark Stanislav /slideshow/security-forthepeople/37916026 securityforthepeople-140812103006-phpapp02
Despite the continued success by attackers to brute-force accounts, phish credentials, and otherwise impact the online security of consumers, a large portion of the sites and services consumers utilize still don't take authentication security seriously enough. This presentation will review recent research into the state of end-user-facing authentication security as it relates to strong authentication, transport security, breach history, security transparency, and complementary browser security features. Through analysis of the ways organizations protect consumer authentication and deploy relevant browser security features, we can gain insight into which sites and services are most focused on ensuring consumers have the best chance defending against attackers. MARK STANISLAV DUO SECURITY Mark Stanislav is the Security Evangelist for Duo Security. With a career spanning over a decade, Mark has worked within small business, academia, startup and corporate environments, primarily focused on Linux architecture, information security, and web application development. He has presented at over 70 events internationally including RSA, ShmooCon, SOURCE Boston, and THOTCON. His security research has been featured on web sites including CSO Online, Security Ledger, and Slashdot. Mark holds a B.S. in Networking & IT Administration and an M.S. in Information Assurance, both from Eastern Michigan University. Mark is currently writing a book titled, "Two-Factor Authentication" (published by IT Governance).]]>

Despite the continued success by attackers to brute-force accounts, phish credentials, and otherwise impact the online security of consumers, a large portion of the sites and services consumers utilize still don't take authentication security seriously enough. This presentation will review recent research into the state of end-user-facing authentication security as it relates to strong authentication, transport security, breach history, security transparency, and complementary browser security features. Through analysis of the ways organizations protect consumer authentication and deploy relevant browser security features, we can gain insight into which sites and services are most focused on ensuring consumers have the best chance defending against attackers. MARK STANISLAV DUO SECURITY Mark Stanislav is the Security Evangelist for Duo Security. With a career spanning over a decade, Mark has worked within small business, academia, startup and corporate environments, primarily focused on Linux architecture, information security, and web application development. He has presented at over 70 events internationally including RSA, ShmooCon, SOURCE Boston, and THOTCON. His security research has been featured on web sites including CSO Online, Security Ledger, and Slashdot. Mark holds a B.S. in Networking & IT Administration and an M.S. in Information Assurance, both from Eastern Michigan University. Mark is currently writing a book titled, "Two-Factor Authentication" (published by IT Governance).]]>
Tue, 12 Aug 2014 10:30:06 GMT /slideshow/security-forthepeople/37916026 duosecurity@slideshare.net(duosecurity) Security For The People: End-User Authentication Security on the Internet by Mark Stanislav duosecurity Despite the continued success by attackers to brute-force accounts, phish credentials, and otherwise impact the online security of consumers, a large portion of the sites and services consumers utilize still don't take authentication security seriously enough. This presentation will review recent research into the state of end-user-facing authentication security as it relates to strong authentication, transport security, breach history, security transparency, and complementary browser security features. Through analysis of the ways organizations protect consumer authentication and deploy relevant browser security features, we can gain insight into which sites and services are most focused on ensuring consumers have the best chance defending against attackers. MARK STANISLAV DUO SECURITY Mark Stanislav is the Security Evangelist for Duo Security. With a career spanning over a decade, Mark has worked within small business, academia, startup and corporate environments, primarily focused on Linux architecture, information security, and web application development. He has presented at over 70 events internationally including RSA, ShmooCon, SOURCE Boston, and THOTCON. His security research has been featured on web sites including CSO Online, Security Ledger, and Slashdot. Mark holds a B.S. in Networking & IT Administration and an M.S. in Information Assurance, both from Eastern Michigan University. Mark is currently writing a book titled, "Two-Factor Authentication" (published by IT Governance). <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securityforthepeople-140812103006-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Despite the continued success by attackers to brute-force accounts, phish credentials, and otherwise impact the online security of consumers, a large portion of the sites and services consumers utilize still don&#39;t take authentication security seriously enough. This presentation will review recent research into the state of end-user-facing authentication security as it relates to strong authentication, transport security, breach history, security transparency, and complementary browser security features. Through analysis of the ways organizations protect consumer authentication and deploy relevant browser security features, we can gain insight into which sites and services are most focused on ensuring consumers have the best chance defending against attackers. MARK STANISLAV DUO SECURITY Mark Stanislav is the Security Evangelist for Duo Security. With a career spanning over a decade, Mark has worked within small business, academia, startup and corporate environments, primarily focused on Linux architecture, information security, and web application development. He has presented at over 70 events internationally including RSA, ShmooCon, SOURCE Boston, and THOTCON. His security research has been featured on web sites including CSO Online, Security Ledger, and Slashdot. Mark holds a B.S. in Networking &amp; IT Administration and an M.S. in Information Assurance, both from Eastern Michigan University. Mark is currently writing a book titled, &quot;Two-Factor Authentication&quot; (published by IT Governance).
Security For The People: End-User Authentication Security on the Internet by Mark Stanislav from Duo Security
]]>
878 6 https://cdn.slidesharecdn.com/ss_thumbnails/securityforthepeople-140812103006-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Making Web Development "Secure By Default" /slideshow/making-web-development-secure-by-default-by-adam-goodman-principal-security-architect-at-duo-security/35397514 2014-selfconference-akgood-140602133147-phpapp02
By Adam Goodman, Principal Security Architect at Duo Security]]>

By Adam Goodman, Principal Security Architect at Duo Security]]>
Mon, 02 Jun 2014 13:31:47 GMT /slideshow/making-web-development-secure-by-default-by-adam-goodman-principal-security-architect-at-duo-security/35397514 duosecurity@slideshare.net(duosecurity) Making Web Development "Secure By Default" duosecurity By Adam Goodman, Principal Security Architect at Duo Security <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2014-selfconference-akgood-140602133147-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> By Adam Goodman, Principal Security Architect at Duo Security
Making Web Development "Secure By Default" from Duo Security
]]>
877 3 https://cdn.slidesharecdn.com/ss_thumbnails/2014-selfconference-akgood-140602133147-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Probing Mobile Operator Networks - Collin Mulliner /duosecurity/pmon-talk-duo-1 pmontalkduo1-140515085815-phpapp01
]]>

]]>
Thu, 15 May 2014 08:58:15 GMT /duosecurity/pmon-talk-duo-1 duosecurity@slideshare.net(duosecurity) Probing Mobile Operator Networks - Collin Mulliner duosecurity <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pmontalkduo1-140515085815-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Probing Mobile Operator Networks - Collin Mulliner from Duo Security
]]>
991 5 https://cdn.slidesharecdn.com/ss_thumbnails/pmontalkduo1-140515085815-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Real Deal of Android Device Security: The Third Party /slideshow/the-real-deal-of-android-device-security-the-third-party/32398541 therealdealofandroiddevicesecurity-thethirdparty-140317083716-phpapp02
]]>

]]>
Mon, 17 Mar 2014 08:37:16 GMT /slideshow/the-real-deal-of-android-device-security-the-third-party/32398541 duosecurity@slideshare.net(duosecurity) The Real Deal of Android Device Security: The Third Party duosecurity <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/therealdealofandroiddevicesecurity-thethirdparty-140317083716-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
The Real Deal of Android Device Security: The Third Party from Duo Security
]]>
854 3 https://cdn.slidesharecdn.com/ss_thumbnails/therealdealofandroiddevicesecurity-thethirdparty-140317083716-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
No Apology Required: Deconstructing BB10 /slideshow/no-apologyrequired-bb10cansecwest2014/32316818 noapologyrequired-bb10-cansecwest2014-140314093752-phpapp02
]]>

]]>
Fri, 14 Mar 2014 09:37:52 GMT /slideshow/no-apologyrequired-bb10cansecwest2014/32316818 duosecurity@slideshare.net(duosecurity) No Apology Required: Deconstructing BB10 duosecurity <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/noapologyrequired-bb10-cansecwest2014-140314093752-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
No Apology Required: Deconstructing BB10 from Duo Security
]]>
5084 7 https://cdn.slidesharecdn.com/ss_thumbnails/noapologyrequired-bb10-cansecwest2014-140314093752-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Internet of Things: We've Got to Chat /slideshow/builditsecurely-bsidessf-2014/32288585 builditsecure-140313155456-phpapp02
BSides SF, February 2014: http://www.securitybsides.com/w/page/70849271/BSidesSF2014 Duo's Zach Lanier (@quine) & Mark Stanislav (@markstanislav) on IoT (Internet of Things) security, announcing http://BuildItSecure.ly]]>

BSides SF, February 2014: http://www.securitybsides.com/w/page/70849271/BSidesSF2014 Duo's Zach Lanier (@quine) & Mark Stanislav (@markstanislav) on IoT (Internet of Things) security, announcing http://BuildItSecure.ly]]>
Thu, 13 Mar 2014 15:54:56 GMT /slideshow/builditsecurely-bsidessf-2014/32288585 duosecurity@slideshare.net(duosecurity) The Internet of Things: We've Got to Chat duosecurity BSides SF, February 2014: http://www.securitybsides.com/w/page/70849271/BSidesSF2014 Duo's Zach Lanier (@quine) & Mark Stanislav (@markstanislav) on IoT (Internet of Things) security, announcing http://BuildItSecure.ly <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/builditsecure-140313155456-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> BSides SF, February 2014: http://www.securitybsides.com/w/page/70849271/BSidesSF2014 Duo&#39;s Zach Lanier (@quine) &amp; Mark Stanislav (@markstanislav) on IoT (Internet of Things) security, announcing http://BuildItSecure.ly
The Internet of Things: We've Got to Chat from Duo Security
]]>
884 3 https://cdn.slidesharecdn.com/ss_thumbnails/builditsecure-140313155456-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-duosecurity-48x48.jpg?cb=1565202092 The Most Loved Company in Security. duo.com https://cdn.slidesharecdn.com/ss_thumbnails/newmindpreso-150513141357-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/newmind-preso/48101954 Security Fact &amp; Fictio... https://cdn.slidesharecdn.com/ss_thumbnails/duogreyhellerwebinar-final2015-01-21-150311090929-conversion-gate01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/securing-access-to-peoplesoft-erp-with-duo-security-and-greyheller/45707143 Securing Access to Peo... https://cdn.slidesharecdn.com/ss_thumbnails/duoforresterutkwebinarwithrickholland2014-09-25final-141117152347-conversion-gate02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/how-to-stop-targeted-attacks-and-avoid-expense-in-depth-with-strong-authentication-duo-security-forrester/41672434 How To Stop Targeted A...