Cisco Duo Blog
Identity Security

Why cybersecurity strategy must start with identity
Build a strong cybersecurity strategy. Discover why identity is the foundation for robust security. Protect your organization.

4 key pillars of building an identity security program
Strengthen your identity security program. Learn the 4 key pillars for building robust IAM. Enhance your security framework.

Secure identities on any device, anywhere: Introducing Duo Desktop Authentication
Duo Desktop authentication allows users to authenticate from a single laptop or desktop seamlessly and securely, offering an easy to deploy auth experience.

A security analyst’s guide to identity threats
An in-depth look at current identity-based threats and a discussion of mechanisms to both prevent and detect them.