The digital world has exploded, and with it, the complexity of managing who accesses what. Today's workforce expands beyond just "employees"—it's a dynamic mix of contractors, partners, and even unique groups like alumni and retirement beneficiaries. Each has distinct access needs. Add to this the sprawl of identity providers (IdPs) and directories from mergers and acquisitions (M&A) or organic growth, and you're left with a tangled web of Active Directory, Okta, Entra ID, and more. It's li...| The Duo Blog
74% of IT leaders admit identity security is often an afterthought in infrastructure planning. Highlights from Duo’s survey of 650 enterprise leaders.| Duo Security
How AI poses new threats to identity How you can detect and respond to attacks on identity faster How Duo helps defenders use AI to fight AI Successful cybersecurity always comes down to time: Can your tools and defenders find and respond to threats before they impact your business? With more threat actors using artificial intelligence (AI) to amplify attacks, CISOs and identity and access management (IAM) leaders need multi-layered, AI-led strategies to stop AI-led threats. A new ebook from ...| The Duo Blog
Over the last five years, enterprise work models have continuously evolved, shifting from COVID-era work-from-home policies to return-to-office initiatives. During this period, over 215,000 global mergers and acquisitions have been announced, complicating identity management and security as no two environments are identical. In the age of AI, humans are still the weakest link, especially when bulk lists of credentials only cost $10-$15 dollars on the dark web according to Talos’ 2024 Year i...| The Duo Blog
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ study for Cisco Duo to measure the value achieved through strong identity security.| Duo Security
Discover how Versa DNS Security detects and blocks advanced DNS-based threats, including malware hidden in TXT records and DNS tunneling attacks. The post How Hackers Use DNS to Spread Malware, and How Versa DNS Security Stops It first appeared on The Versa Networks Blog.| The Versa Networks Blog
Ensure EU AI Act compliance with Versa Universal SASE. Gain visibility, stop data leaks, and secure GenAI with audit-ready controls and oversight.| The Versa Networks Blog - The Versa Networks Blog
Discover why SASE performance is more than a technical metric. Learn how latency, TLS inspection, and throughput affect security, scalability, and trust.| The Versa Networks Blog - The Versa Networks Blog
Organizations have put in a ton of work to ensure their data and resources are comprehensively protected with strong user authentication. In doing so, the goalpost has shifted, and attackers are now looking for another way in. According to Splunk, 98% of cyberattacks now rely on social engineering, the vast majority of which are directed towards compromising user identities. Attacks commonly take place during vulnerable moments in workforce users’ lifecycles. These include: Calling the help...| The Duo Blog
At Duo, we've been obsessed with a growing threat that keeps security teams up at night: Session hijacking. Recently, we announced a patent-pending breakthrough that marks a fundamental shift in how we think about authentication security. According to the 2024 IBM X-Force Threat Intelligence Index, use of stolen credentials to access valid accounts surged 71% over the previous year and represented 30% of all incidents X-Force responded to, tied with phishing as the top infection vectors. Duo ...| The Duo Blog
The new Duo and Netscaler integration gives customers an easier way to integrate and simplifies deployment.| Duo Security
This blog shows how bringing LLM-powered automation into policy management helps security and networking teams build, audit, and optimize network policies more efficiently. It integrates into existing workflows, offering real-time access to current configurations and intelligent policy insights — all without requiring teams to switch tools.| The Versa Networks Blog - The Versa Networks Blog
As security’s new front line of defense, user identities must be fully protected at all times. That’s why after rigorous, first-of-its-kind identity testing, SE Labs® awarded Universal Zero Trust Network Access (UZTNA) from Cisco its highest AAA rating for “Advanced Security IAM Protection.” Universal ZTNA combines multiple products to deliver zero trust authentication and protection against identity-based attacks: Cisco Duo Cisco Secure Access Cisco Identity Intelligence (CII) The s...| The Duo Blog
Blog writing provides a great opportunity to drop some pop culture references that help illustrate your points. For example, “Your identity is your most valuable possession. Protect it.” is a great line from the film, The Incredibles. It’s also very relevant to Duo customers. Duo’s long been a leader in defending against identity-based threats and securely managing access to critical assets. However, we’ve evolved into something more. Duo is now a security-first Identity and Access ...| The Duo Blog
With Proximity Verification built into Duo’s IAM solution, organizations get strong, phishing-resistant authentication.| Cisco Duo
Attackers have evolved. They are bypassing traditional MFA. To combat this, Duo is making it easy to deploy phishing-resistant MFA end-to-end.| Cisco Duo
We know administrators are busy. To make securing identity easier than ever, we’re excited to announce the Cisco AI Assistant for Duo, our newest addition in Cisco’s suite of AI Assistants enhancing the security and IT team experience. Identity administrators today are strapped for time. They manage their directory, application implementations, system migrations, and more. When a user calls the help desk (sometimes a single administrator wearing many hats), their goal is to unblock that u...| The Duo Blog
When it comes to securing your organization, one thing is clear: identity and access management (IAM) is no longer just an IT task. It’s a critical component of your security strategy. Yet, for many organizations, IAM solutions have fallen short of delivering security as a foundational feature. In a recent Cisco survey of 650 IT and security leaders, 73% revealed that security is often an afterthought in identity infrastructure decisions, while 75% identified complexity in identity infrastr...| The Duo Blog
Identity is under siege. Sixty percent of all Cisco Talos IR cases in 2024 saw identity as a key component of reported attacks. Organizations are facing relentless challenges in keeping their systems secure. As attackers grow more sophisticated, traditional Identity and Access Management (IAM) providers have fallen short, leaving critical gaps in their defenses. At Duo, we’ve been watching this unfold, and honestly, we’ve had enough. That’s why we’re proud to announce that Duo is offi...| The Duo Blog
Cisco & Duo are doubling down on a security-first approach to identity & access management. Learn about Cisco Duo’s identity security capabilities.| Cisco Duo