“Comprehensive security should be built in or enabled by default” — a statement implored by Patrick Optet, CISO at JP Morgan Chase. In an open letter to their third-party providers, Optet points out an erosion of strong authentication and authorization practices as software providers prioritize speed of development over security. Complexity is the reality for organizations of all sizes. With an ever-distributed supply chain and increasingly modern software demands, security controls exp...| The Duo Blog
Have you ever wished managing policies was … easier? Maybe you’ve wanted to restrict access for a certain group of users across all applications—but found yourself stuck clicking through every single application to make it happen. Or maybe you wanted to pilot a new control with a small set of users — but the setup felt more like a marathon than a test run. If either of those scenarios sound familiar, we have some good news. We’re introducing two new capabilities designed to give you...| The Duo Blog
Cyber threats today are faster, stealthier, and more adaptive than ever before. Endpoint Detection and Response (EDR) has become a critical line of defense. However, it’s not enough on its own. Network-layer controls must work hand-in-hand with endpoint intelligence to stop attackers before they can move laterally, exfiltrate data, or disrupt operations.| The Versa Networks Blog - The Versa Networks Blog
Duo’s AI and Security Research Team takes a hard look at when attackers attempt to bypass MFA by adding devices they control as MFA factors.| Duo Security
Once the workday begins, most employees log into a wide range of tools. For the average knowledge worker, this can be as many as 11 different applications, nearly double that of 2019. These apps could span multiple identity providers creating a fragmented identity ecosystem. For many companies, keeping track of who has access to what is almost impossible and that lack of visibility leaves blind spots. Cisco Talos threat intelligence found that, in 2024, 60% of all attacks were identity-based....| The Duo Blog
Security Operations Centers (SOCs) rely heavily on Splunk for its powerful capabilities in collecting, indexing, and analyzing vast amounts of security data from diverse sources. Splunk excels in processing logs and security events but achieving comprehensive correlation across today’s diverse and sometimes fragmented enterprise identity landscape has always been a difficult task. That’s why several new integrations bringing relevant and timely identity information into Splunk are true ga...| The Duo Blog
Identity remains a major cause of breaches. It is time to adopt a security-first approach—Duo can help.| Duo Security
Learn how Versa Networks helps financial institutions meet DORA compliance with secure, resilient networking and ICT risk management solutions. The post Understanding DORA Compliance with Versa first appeared on The Versa Networks Blog.| The Versa Networks Blog
The digital world has exploded, and with it, the complexity of managing who accesses what. Today's workforce expands beyond just "employees"—it's a dynamic mix of contractors, partners, and even unique groups like alumni and retirement beneficiaries. Each has distinct access needs. Add to this the sprawl of identity providers (IdPs) and directories from mergers and acquisitions (M&A) or organic growth, and you're left with a tangled web of Active Directory, Okta, Entra ID, and more. It's li...| The Duo Blog
74% of IT leaders admit identity security is often an afterthought in infrastructure planning. Highlights from Duo’s survey of 650 enterprise leaders.| Duo Security
How AI poses new threats to identity How you can detect and respond to attacks on identity faster How Duo helps defenders use AI to fight AI Successful cybersecurity always comes down to time: Can your tools and defenders find and respond to threats before they impact your business? With more threat actors using artificial intelligence (AI) to amplify attacks, CISOs and identity and access management (IAM) leaders need multi-layered, AI-led strategies to stop AI-led threats. A new ebook from ...| The Duo Blog
Over the last five years, enterprise work models have continuously evolved, shifting from COVID-era work-from-home policies to return-to-office initiatives. During this period, over 215,000 global mergers and acquisitions have been announced, complicating identity management and security as no two environments are identical. In the age of AI, humans are still the weakest link, especially when bulk lists of credentials only cost $10-$15 dollars on the dark web according to Talos’ 2024 Year i...| The Duo Blog
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ study for Cisco Duo to measure the value achieved through strong identity security.| Duo Security
Ensure EU AI Act compliance with Versa Universal SASE. Gain visibility, stop data leaks, and secure GenAI with audit-ready controls and oversight.| The Versa Networks Blog - The Versa Networks Blog
Discover why SASE performance is more than a technical metric. Learn how latency, TLS inspection, and throughput affect security, scalability, and trust.| The Versa Networks Blog - The Versa Networks Blog
Organizations have put in a ton of work to ensure their data and resources are comprehensively protected with strong user authentication. In doing so, the goalpost has shifted, and attackers are now looking for another way in. According to Splunk, 98% of cyberattacks now rely on social engineering, the vast majority of which are directed towards compromising user identities. Attacks commonly take place during vulnerable moments in workforce users’ lifecycles. These include: Calling the help...| The Duo Blog
At Duo, we've been obsessed with a growing threat that keeps security teams up at night: Session hijacking. Recently, we announced a patent-pending breakthrough that marks a fundamental shift in how we think about authentication security. According to the 2024 IBM X-Force Threat Intelligence Index, use of stolen credentials to access valid accounts surged 71% over the previous year and represented 30% of all incidents X-Force responded to, tied with phishing as the top infection vectors. Duo ...| The Duo Blog
The new Duo and Netscaler integration gives customers an easier way to integrate and simplifies deployment.| Duo Security
This blog shows how bringing LLM-powered automation into policy management helps security and networking teams build, audit, and optimize network policies more efficiently. It integrates into existing workflows, offering real-time access to current configurations and intelligent policy insights — all without requiring teams to switch tools.| The Versa Networks Blog - The Versa Networks Blog
As security’s new front line of defense, user identities must be fully protected at all times. That’s why after rigorous, first-of-its-kind identity testing, SE Labs® awarded Universal Zero Trust Network Access (UZTNA) from Cisco its highest AAA rating for “Advanced Security IAM Protection.” Universal ZTNA combines multiple products to deliver zero trust authentication and protection against identity-based attacks: Cisco Duo Cisco Secure Access Cisco Identity Intelligence (CII) The s...| The Duo Blog
Cisco & Duo are doubling down on a security-first approach to identity & access management. Learn about Cisco Duo’s identity security capabilities.| Cisco Duo