Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
ANN ARBOR, MI -- (Marketwired) -- 07/28/15 -- Duo Security, a cloud-based access security provider protecting the world's largest and fastest-growing companies, today announced the expansion of its security research division, Duo Labs. Duo has hired four leading researchers and industry experts to escalate efforts to improve the overall state of security by publishing research, with a focus on authentication security.
Steve Manzuik joins Duo Labs as Director of Security Research. He has worked in the industry for over twenty years for organizations such as Juniper Networks, eEye Digital Security, and Ernst & Young. Manzuik has authored several books, including Hack Proofing Your Network. Having presented at information security conferences, such as BlackHat, ShmooCon, and AusCERT, Manzuik's deep industry experience will drive Duo Labs research.
Joining Manzuik and the existing Duo Labs team is Mikhail Davidov, Senior Security Researcher, Mark Loveless, Senior Security Researcher, and Darren Kemp, Security Researcher. Davidov led research and development at Leviathan Security Group, where he developed automated crash dump analysis tools for DARPA. He specializes in reverse engineering, native application security, high performance simulation, smart fuzzer development, embedded hardware security assessment, and reverse software engineering.
Best known in the industry by his handle "Simple Nomad," Loveless has been compromising security systems since the 1980s. He has worked as an IT Systems Administrator in the Fortune 500, as a researcher for security software and hardware vendors. Most recently, he was a consultant with MITRE Corporation, the non-profit organization that runs research and development centers for the federal government.
Darren Kemp held previous positions at Leviathan Security Group and Symantec, where he specialized in vulnerability, malware analysis, and reverse engineering.
Duo Labs will be attending BlackHat and DefCon in Las Vegas, NV, in August and will be available for media and analyst meetings. At BlackHat, Duo Security will also be announcing our Women in Security Award winners.
"With the rise of mobile and constant connectivity, the risks posed by hackers continues to rise," said Jon Oberheide, CTO and co-founder at Duo Security. "We need the best minds to help us innovate and improve our products with a security-first approach and to educate the industry on the latest threats."
Duo Labs has been a major contributor to industry research. The team revealed the disclosure of a bypass in PayPal's two-factor authentication and a similar bypass of Google's two-factor authentication. In addition, Duo Labs has also been on the cutting edge of authentication security, launching tools such as VPN Hunter and Did I Get Gawkered?
About Duo Security
Duo Security is a cloud-based access security provider protecting the world's fastest-growing companies and thousands of organizations worldwide, including Dresser-Rand Group, Etsy, Facebook, K-Swiss, The Men's Wearhouse, NASA, Paramount Pictures, Random House, SuddenLink, Toyota, TripAdvisor, Twitter, Yelp, Zillow, and more. Duo Security's innovative and easy-to-use technology can be quickly deployed to protect users, data, and applications from breaches, credential theft and account takeover. Duo Security is backed by Benchmark, Google Ventures, Radar Partners, Redpoint Ventures and True Ventures. Try it for free at www.duosecurity.com.
Contact:
Sally Feller Lanier
PR Manager
Duo Security
sally@duosecurity.com
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs