Cisco Duo Blog
Product & EngineeringMeet the new Duo IAM

Turning Microsoft MFA requirement for Azure into epic security win with Duo
You can satisfy Microsoft's mandatory MFA requirement for Azure using several Duo configurations, better protecting any Azure resources you're using.

The security industry is immature, but you’re not
Learn the trends and incentives for builders, practitioners, and attackers keeping the security industry in a reactionary loop—and, how to stop it.

Legacy authentication protocols: Why RADIUS is (still) important
RADIUS is a vital protocol, and can be used when protecting applications with Duo to meet an organization's specific environment and end-user needs.

Proactive threat hunting in Duo data
Learn how Duo's data scientists and threat analysts proactively identify and prevent novel attack methods across billions of authentications.

Dive in with Duo Passport: A secure, seamless future
Duo Passport drives seamless access to all permitted apps with one interactive authentication. It's security customers need with less inconvenience for users.

Authentication alone is failing: Introducing Continuous Identity Security
To address an increase in identity attacks and ease the user frustration of repeated auth, Duo is introducing Continuous Identity Security and Duo Passport.

Best practices for enrolling users in MFA
Enrolling users in MFA is essential for security, but enrollment can be a logistical challenge. We unpack best practices for enrollment in our blog.

A security analyst’s guide to identity threats
An in-depth look at current identity-based threats and a discussion of mechanisms to both prevent and detect them.

Announcing Identity Intelligence with Duo
Cisco & Duo are doubling down on a security-first approach to identity & access management. Learn about Cisco Duo's identity security capabilities.

A clear and present need: Bolster your identity security with threat detection and response
IT teams need an identity security program built on a strong foundation with the right tools. Learn how to design a program, and how to implement ITDR.