Duo Security
@duosec.bsky.social
đ€ 80
đ„ 5
đ 90
đ± | Duo.com đ | Duo is now a part of
@Cisco.com
đ | Human-Centered Security Solutions
Third-party access shouldnât mean third-rate security. In our latest blog, explore how Duo secures external users with phishing-resistant MFA, a flexible user directory, and streamlined identity management built for modern enterprises. Read the full post:
cs.co/6332774pkv
loading . . .
Duo for third-party identity management | Duo Security
Discover how Duoâs IAM solutions secure third-party access with phishing-resistant MFA, flexible user directory, and streamlined identity management.
https://cs.co/6332474pks
about 18 hours ago
0
0
0
Adversary-in-the-Middle attacks are making traditional MFA easier to bypass. Our latest blog breaks down how Proximity Verification adds a stronger layer of protection to keep your logins secure. Read the full blog:
cs.co/633237FunH
loading . . .
Thwarting attacks with proximity verification | Duo Security
Bypassing of traditional MFA using techniques like adversary-in-the-middle are gaining momentum. Protect your logins with Proximity Verification.
https://cs.co/633207FunE
3 days ago
0
0
0
How ready is your organization to secure agentic AI? Join our expert panel as we break down the real risks, identity challenges, and emerging best practices for keeping autonomous AI systems secure. Register for the live discussion:
cs.co/633227Ic6m
4 days ago
0
0
1
AI agents are quickly becoming part of everyday workflows. OAuth sets the guardrails â and Duo makes that governance secure, scalable, and simple enough for enterprises to adopt with confidence. Read the full blog:
cs.co/633277o4aS
loading . . .
Duo OAuth for Agentic AI | Duo Security
AI agents are already becoming part of daily work. OAuth ensures they operate within safe boundaries. Duo makes that governance secure, scalable, and simple enough for enterprises to adopt with confidence.
https://cs.co/633247o4ao
10 days ago
0
1
0
Duoâs new policy editor makes granular access control effortless with an intuitive interface, smart recommendations, and real-time impact data. đ Learn more:
cs.co/633257iWRx
#CiscoDuo
#CyberSecurity
#AccessControl
loading . . .
The dawn of a simpler, helpful policy experience | Duo Security
Duoâs new policy editor simplifies granular access control with an intuitive interface, recommendations, and impact data.
https://cs.co/633257iWRx
15 days ago
0
1
0
According to a @cisco.com study, only 33% of IT leaders trust their identity defenses. Itâs time to shift to a ânever trust, always verifyâ model. Identity is now ground zero in the cyber-warzone. Read more from Technology Magazine:
cs.co/633277e4Gb
18 days ago
0
2
0
Duo's Proximity Verification delivers NIST-validated phishing resistance (AAL2/AAL3), stopping advanced MFA attacks. Read the Kantara report for details on enhanced security:
cs.co/633217kGpz
loading . . .
Kantara: Cisco Duo Proximity Verification Summary Report
Kantara: Cisco Duo Proximity Verification Summary 2025 Report
https://cs.co/633217kGpz
22 days ago
0
0
0
Attn. Asia-Pacific customers: Cisco AI Assistant for Duo is expanding to Asia-Pacific Security teams can bring smarter, faster identity security with enterprise-grade privacy and compliance. Learn more in the blog:
cs.co/633227VDqs
loading . . .
Duo AI Assistant expanding to Asia-Pacific | Duo Security
Cisco AI Assistant for Duo expands to Asia-Pacific, delivering smarter, faster identity security with enterprise-grade privacy and compliance.
https://cs.co/633227VDqs
24 days ago
0
0
0
Every 39 seconds, thereâs a new cyberattack somewhere in the world. With Duo, youâre already multi-FA-steps ahead. đ
28 days ago
0
0
0
AI is transforming how organizations manage identity dataâturning complex queries into actionable insights in seconds. Learn how in our latest blog:
cs.co/633217OXgW
29 days ago
0
0
0
"But I already have a directory. Why change?" We hear this question a lot. Ripping out and replacing core identity infrastructure is a massive undertaking. That's why Duo Directory is designed for flexibility. Learn more from @msspalert.bsky.social:
cs.co/633237OXV3
loading . . .
Adopt a Security-first Approach to Identity with Duo Directory
Identity is at the center of the majority of breaches.
https://cs.co/633237OXV3
29 days ago
0
0
0
What can you achieve in 30 days? Quite a lot, actually. Experience award-winning security with a 30-day free trial. Activate in minutes:
cs.co/6332973ELS
loading . . .
30 days ago
0
0
0
Trust starts with identity. Our new eBook explores how modern access solutions can restore confidence, strengthen protection, and simplify security for todayâs hybrid workforce. Download your copy here:
cs.co/633217KUN9
about 1 month ago
0
0
0
Cybersecurity Awareness Month may be ending, but good security habits shouldnât. â See how Duo helps you stay protected all year long:
cs.co/633277GhoL
#DuoIAM
#PhishingSeasonIsOver
#CyberSecurityMonth
about 1 month ago
0
2
0
Why is role-based access control critical to your security stack? With enhanced Role-Based Access Control for subaccounts, Duo delivers even stronger security with high productivity. Learn about RBAC and all its benefits in the latest blog:
cs.co/6332771huv
loading . . .
Duo Blog: Discover Security Insights and News | Duo Security
Explore the Duo Blog for expert tips, security insights, and resources to stay updated on the latest in security and access management trends.
https://cs.co/6332571hut
about 1 month ago
0
1
0
It looks legitimate, but itâs phishing bait. đ§ An invoice. A rĂ©sumĂ©. A trap. With Duoâs new IAM solution, cut the line before your users are reeled in. Learn more:
cs.co/6332071yfC
#PhishingSeasonIsOver
loading . . .
about 1 month ago
0
1
0
Read how Inductive Automation + Duo enhanced device trust, streamlined IAM, and built strong phishing resistance. Read the case study:
cs.co/633297E25c
#DuoIAM
#PhishingResistance
about 1 month ago
0
1
0
We've all heard of phishing...but have you heard of vishing? A vishing attack uses phone calls or voice messages to trick you into revealing sensitive information. Cybercriminals often impersonate trusted organizations, creating a false sense of urgency or fear to manipulate their targets.
about 1 month ago
0
0
0
In our latest blog, find out if end-to-end phishing resistance is a stretch goal, or a short-term reality. Read more and secure your organizationâs identity lifecycle:
cs.co/633247D9OQ
đĄ P.S. Free guide available in the blog for download!
#PhishingResistance
#MFA
#DuoIAM
loading . . .
End-to-End Phishing Resistance: Stretch Goal or Reality? | Duo Security
Discover strategies to achieve end-to-end phishing resistance and secure your organizationâs identity lifecycle. Download the free guide today!
https://cs.co/633217D9OS
about 1 month ago
0
0
0
Using AWS investments with Duo? This webinar is for you. Designed for security professionals and organizations from SMB to Enterprise, learn how to build a robust Zero Trust identity security framework for your AWS environment and beyond. Join us on October 28th:
cs.co/6332078cfQ
about 1 month ago
0
2
0
We're busting some of the biggest myths about going passwordless with our friends
@talosintelligence.com
đ§ Any of these surprise you? Swipe through to see them all and check out their blog for moređ
add a skeleton here at some point
about 1 month ago
0
0
0
We surveyed 650 Security and IT leaders across North America and Europe to uncover the stark realities and hidden vulnerabilities of todayâs identity security postures. We found an urgent need for organizations. Read the findings:
cs.co/63325ACttl
about 1 month ago
0
0
0
Managing user access just got easier. With User-Group Policy and Bulk Apply, you can: - Scale changes across your organization effortlessly - Save time on repetitive tasks - Keep access policies consistent, all from the Policy page See the updates in the blog:
cs.co/63326A7Nnq
loading . . .
User-Group Policy & Bulk Apply: Smarter Policy Management | Duo Security
Discover how User-Group Policy and Bulk Apply make it easier to manage access, scale changes, and save time â all from the Policy page.
https://cs.co/63324A7Nno
about 1 month ago
0
1
0
See how security-first IAM can be phased inâno rip-and-replace needed. Duo streamlines MFA, SSO, device trust, and third-party management out-of-the-box. Read the latest blog:
cs.co/63329AAQiZ
loading . . .
How to Evolve to âSecurity-Firstâ IAM | Duo Security
See how security-first IAM can be phased inâno rip-and-replace needed. Duo streamlines MFA, SSO, device trust, and third-party management out-of-the-box.
https://cs.co/63328AAQik
about 1 month ago
0
0
0
Is your IAM truly secure? Learn why security-first IAM with default MFA and device trust is key to preventing identity-based cyberattacks. More in the blog:
cs.co/63329A0cDJ
loading . . .
Why IAM Should Put Security First | Duo Security
Is your IAM truly secure? Learn why security-first IAM with default MFA and device trust is key to preventing identity-based cyberattacks.
https://cs.co/63329A0cDJ
about 2 months ago
0
0
0
From AI-assisted deployment to phishing-resistant proximity verification, Duo is redefining how organizations secure access while keeping users productive. See these innovations and more in action at Authenticate 2025 | Booth #314:
cs.co/63324Axb64
loading . . .
about 2 months ago
0
0
0
Curious what we mean by end-to-end phishing resistance? Get a sneak peek from Matt Caulfield, and see it all in action at #Authenticate2025âš Explore how we are transforming Identity and Access Management with seamless and secure authentication:
cs.co/63329AsCXS
loading . . .
about 2 months ago
0
0
0
Attackers are finding new ways to exploit familiar tools. Cisco Talos recently spoke with ITBrew about how bad actors are leveraging collaboration platforms for old-school scams like spoofed calls. Stay aware, stay protected:
cs.co/63324AsWer
loading . . .
How AI is reshaping cybersecurity
âIf our barrier to entry is lower, so is the attackersââand their ability to develop exploits and develop new command and control capabilities,â Splunk CISO says.
https://cs.co/63324AsWer
about 2 months ago
0
0
0
Cloud content management company Box relies on Duo to help them block 100% of unauthorized access attempts. Read the full study and learn how Duo sets high bar for security:
cs.co/63327ASeJH
#SecurityStandards
#Duo
#Identity
#MFA
#CustomerSuccess
about 2 months ago
0
1
0
Unless theyâre literally next to you, those hackers are out of luck. Duoâs end-to-end phishing resistance includes proximity verification, which uses biometrics and Bluetooth to confirm itâs really you. Try it out for free:
cs.co/63326ASnPG
loading . . .
about 2 months ago
0
1
0
From pilot to global launch, hereâs how we tested Duo Directory at Black Hat: - BH Europe 2024: Pilot - BH Asia 2025: Full deployment (20â30 users) - BH USA 2025: 100+ users - Official launch Read the full story:
cs.co/63321AqzoF
about 2 months ago
0
0
0
Duoâs AI and Security Research Team takes a hard look at when attackers attempt to bypass MFA by adding devices they control as MFA factors. See what they found:
cs.co/63325AUsoX
#AI
#Security
#MFA
loading . . .
Device bait and switch: A case of device replacement | Duo Security
Duoâs AI and Security Research Team takes a hard look at when attackers attempt to bypass MFA by adding devices they control as MFA factors.
https://cs.co/63322AUsop
about 2 months ago
0
0
0
@talosintelligence.com found something BIG last year: Identity was a factor in more than 60% of all breaches. For too long, organizations relied on strong authentication. MFA alone is no longer enough. Read how to close this critical security gap:
cs.co/63323AY14c
loading . . .
Closing the Gap: Integrating Identity into Your Detection and Response Strategy
To close a critical security gap, leaders need a new framework built on three pillars: visibility, adaptive defense, and identity-infused response.
https://cs.co/63323AY14c
2 months ago
0
1
0
AI Agents can accelerate productivity, but without visibility, they also introduce new risks. In our latest blog, learn how Duo with Cisco Identity Intelligence helps organizations gain visibility and secure AI agents:
cs.co/63321A96NT
#AI
#AIAgents
#Duo
loading . . .
Expanding visibility for the rise of AI agents | Duo Security
As organizations begin to deploy and operationalize AI Agents, gaining holistic visibility into their activity will be crucial to balancing productivity with security.
https://cs.co/63321A96NT
2 months ago
0
1
0
AI is changing the threat landscape. 82% of financial decision-makers are already increasing identity security budgets, yet too many organizations still treat it as an âadd-on.â One of the most effective first lines of defense? Identity-first security. Read more:
cs.co/63328A57NG
loading . . .
Why identity-first security is the first defense against sophisticated AI-powered social engineering
Enterprise security is having an identity crisis. Attackers aren't going after zero-day exploits on a server or an operating system; instead, the vast majority of security breaches are happening in a surprisingly low-tech wave of identity compromise via social engineering.
https://cs.co/63328A57NG
2 months ago
0
1
0
87% of security pros say phishing-resistant MFA is critical. But only 19% have fully implemented FIDO2 tokens. That gap between awareness and action leaves organizations exposed:
cs.co/63328AdepA
#IdentitySecurity
#MFA
#FIDO2
2 months ago
0
0
0
Attn. MSPs: Identity attacks are on the rise. Are your clients prepared? Duo makes it simple to protect identities while adding real value for your clients. Learn how you can stay ahead:
cs.co/63323AdROb
#Identity
#MSP
#Duo
loading . . .
Identity security for MSPs: From blind spots to growth | Duo Security
Identity attacks are rising. Discover how MSPs can uncover risks, improve posture, and deliver proactive advisory services with Duo.
https://cs.co/63321AdROZ
2 months ago
0
0
0
October is around the corner, which means
#CybersecurityAwarenessMonth
! We plan to set the record straight and bust the biggest myths in cybersecurity. But first, we want to hear from you: What âtruthsâ have you heard that donât quite add up? Drop your questions!
2 months ago
0
2
2
The perfect Duo: strong security meets simple access. All wrapped in an easy-to-use experience â Don't take our word for it, though - it's all in the numbers:
cs.co/63326AwDJI
- $500k in annual IT savings - 1.3b monthly authentications
#DuoIAM
#Identity
#UserExperience
2 months ago
0
0
0
Identity security isnât just about people anymoreâitâs about AI too. đĄ Join our Sept 25 webinar to get a rare glimpse into whatâs next: securing AI agents and MCP servers with trusted, verifiable identities. Register today:
cs.co/63324AkSGp
2 months ago
0
0
0
Every user. Every login. Always secure. With Duo, identity security is built in. Not bolted on. From phishing-resistant MFA to zero trust access and adaptive policies, Duo protects organizations of every size, in every industry. â See how:
cs.co/63327ApWOP
3 months ago
0
2
1
Looking for smarter operations? More context is your answer. By integrating Cisco Identity Intelligence with Splunk, security teams get the identity context they need to succeed in an evolving security landscape. Read more about smarter security in our blog:
cs.co/63326ARZhC
loading . . .
Smarter security with Cisco Identity Intelligence & Splunk | Duo Security
Splunk is great, and by integrating Cisco Identity Intelligence, security teams get the identity context they need to succeed.
https://cs.co/63323ARZhf
3 months ago
0
0
0
Curious how Duo can streamline Windows Logon? See it in action with our step-by-step demo and learn how to add two-factor authentication for both Remote Desktop and local logons. Secure access made simple. (Optimized for desktop users)
cs.co/63329ARwTD
#SecureAccess
#WindowsLogon
loading . . .
3 months ago
0
0
0
60% of breaches involve identity, 40% involve MFA. đ Attacks happen beyond login. Join us Sept 17 to learn how Duo makes phishing-resistant MFA simple and effectiveđĄ
cs.co/63322ARXIG
3 months ago
0
0
0
Think your MFA has you covered? Think again. â ïž Join us on September 17th to see how end-to-end protection with Duo changes the game:
cs.co/63324APdce
See how end-to-end protection with Duo changes the game:
cs.co/63324APdce
loading . . .
3 months ago
0
1
1
MFA thatâs as easy as pressing A+B+Start. Check us out:
cs.co/63327A3GFt
#VideoGameDay
3 months ago
0
0
0
Identity remains a major cause of breaches with 60% involving identity and 40% involving MFA issues. Our latest blog explores how adopting a security-first approach can help:
cs.co/63320A3GUM
loading . . .
A security-first approach to identity with Duo Directory | Duo Security
Identity remains a major cause of breaches. It is time to adopt a security-first approachâDuo can help.
https://cs.co/63327A3GUJ
3 months ago
0
0
1
Identity isnât just access. Itâs trust, risk, and visibility đ Remote work, cloud, and AI are expanding the attack surface. Are you exposed? Duoâs new global survey of 650 security leaders shows where orgs succeedâand where they donât.
cs.co/63329AHPjW
loading . . .
3 months ago
0
1
1
Securing thousands of logins is critical as higher ed embraces AI & remote learning. EdTech reviews how Duo enables zero-trust with MFA, protecting data while keeping access simple.
cs.co/63321A8Ul7
3 months ago
0
0
0
Boost productivity and user satisfaction with Duo SSO. One login, every app. Plus, device health checks at every step. Simple, secure, seamless. Try the interactive demo: (Recommended on desktop)
cs.co/63324ABlH4
3 months ago
0
0
0
Load more
feeds!
log in