Cisco Duo Blog
Product & EngineeringMeet the new Duo IAM

Legacy authentication protocols: Why RADIUS is (still) important
RADIUS is a vital protocol, and can be used when protecting applications with Duo to meet an organization's specific environment and end-user needs.

Proactive threat hunting in Duo data
Learn how Duo's data scientists and threat analysts proactively identify and prevent novel attack methods across billions of authentications.

Dive in with Duo Passport: A secure, seamless future
Duo Passport drives seamless access to all permitted apps with one interactive authentication. It's security customers need with less inconvenience for users.

Authentication alone is failing: Introducing Continuous Identity Security
To address an increase in identity attacks and ease the user frustration of repeated auth, Duo is introducing Continuous Identity Security and Duo Passport.

Best practices for enrolling users in MFA
Enrolling users in MFA is essential for security, but enrollment can be a logistical challenge. We unpack best practices for enrollment in our blog.

A security analyst’s guide to identity threats
An in-depth look at current identity-based threats and a discussion of mechanisms to both prevent and detect them.

Announcing Identity Intelligence with Duo
Cisco & Duo are doubling down on a security-first approach to identity & access management. Learn about Cisco Duo's identity security capabilities.

A clear and present need: Bolster your identity security with threat detection and response
IT teams need an identity security program built on a strong foundation with the right tools. Learn how to design a program, and how to implement ITDR.

Zero trust application access: Protecting against compromised endpoints
Increase application security by blocking compromised endpoints in order to achieve a Zero Trust using Cisco Secure Endpoint and Duo Trusted Endpoints.

What are passkeys
Want to learn more about how passkeys provide secure access to protected resources? Learn how passkeys work and how they fit into a passwordless ecosystem.