Cisco Duo Blog
Identity Security
The Hitchhiker’s Guide to Shibboleth
Shibboleth IDP is an open-source identity provider that requires bravery to deploy. This blog post walks through how to conquer configuration.
How to protect your Active Directory with Duo’s new MFA and visibility solutions
Explore how Cisco Duo enhances MFA and visibility to protect your critical on-prem AD identities with Active Directory Defense.
Cisco Secures 125K user identities with Duo while advancing passwordless journey
Cisco uses Duo to secure its global workforce of close to 125,000 users and 285,000 devices, and has implemented strategic initiatives like passwordless.
From protocol to practice: Secure the AI agent ecosystem with Duo
Secure your AI agent ecosystem with Duo’s new MCP integration, supporting the latest OAuth standards for scalable, least-privilege access control.
Standing out in a crowded MSP market
Learn how MSPs can stand out by turning quiet security into visible results with Duo, delivering trust, compliance, and measurable outcomes.
Thwarting adversary-in-the-middle attacks with Proximity Verification
Bypassing of traditional MFA using techniques like adversary-in-the-middle are gaining momentum. Protect your logins with Proximity Verification.
OAuth 2.0's next chapter: Enabling the AI security revolution
AI agents are already becoming part of daily work. OAuth ensures they operate within safe boundaries. Duo makes that governance secure, scalable, and simple enough for enterprises to adopt with confidence.
Simplifying identity security queries with AI
Leveraging AI makes querying complicated identity data simple—unlocking powerful security insights in the blink of an eye.
Evolving to “Security-First” IAM — without starting from scratch
See how security-first IAM can be phased in—no rip-and-replace needed. Duo streamlines MFA, SSO, device trust, and third-party management out-of-the-box.
Why IAM should put security first
Is your IAM truly secure? Learn why security-first IAM with default MFA and device trust is key to preventing identity-based cyberattacks.