Cisco Duo Blog
Product & EngineeringMeet the new Duo IAM

A clear and present need: Bolster your identity security with threat detection and response
IT teams need an identity security program built on a strong foundation with the right tools. Learn how to design a program, and how to implement ITDR.

Zero trust application access: Protecting against compromised endpoints
Increase application security by blocking compromised endpoints in order to achieve a Zero Trust using Cisco Secure Endpoint and Duo Trusted Endpoints.

What are passkeys
Want to learn more about how passkeys provide secure access to protected resources? Learn how passkeys work and how they fit into a passwordless ecosystem.

3 steps to prevent a case of compromised credentials
We break down the precautionary measures and solutions to reduce the impact of credential compromise today as our passwords pose larger risks than ever.

Raising the bar: Duo redefines what is essential for access management
By combining strong authentication, attack-resistant MFA, Passwordless, SSO, and Trusted Endpoints all-in-one, Duo redefines access management.

WebAuthn, passwordless and FIDO2 explained: Fundamental components of a passwordless architecture
We're breaking down the basic building blocks of passwordless technology: WebAuthn, FIDO, CTAP, FIDO2, and how it all comes together for the user.

MFA fatigue: What it is and how to respond
Multi-factor muthentication (MFA) fatigue is a new attack technique used by cybercriminals. Learn what organizations can do to protect against it.

Verified Duo Push makes MFA more secure
How do you make MFA even more secure? By rolling out verified push, so that the login they approve isn't for a malicious actor trying to access their accounts.

Understanding the new PCI DSS 4.0 requirements
The Payment Card Industry Data Security Standard (PCI DSS) recently updated their standards from PCI DSS 3.2.1 to PCI DSS 4.0. Here is what you need to know.

How much does multi-factor authentication cost? A breakdown of true costs
Total cost of ownership is a key consideration when evaluating security vendors. We go over what you should know before investing in an MFA solution.