Cisco Duo Blog
mfa

Don’t get hooked! 5 essential security tips to combat holiday phishing
The holidays are a popular time for phishing attacks, but there are ways that you can protect yourself your organization from these threats.

5 reasons why it make sense to step up to Duo Advantage
Duo Advantage offers more features and value to Duo customer, including identity security, device health checks and risk-based authentication.

Turning Microsoft MFA requirement for Azure into epic security win with Duo
You can satisfy Microsoft's mandatory MFA requirement for Azure using several Duo configurations, better protecting any Azure resources you're using.

Authentication alone is failing: Introducing Continuous Identity Security
To address an increase in identity attacks and ease the user frustration of repeated auth, Duo is introducing Continuous Identity Security and Duo Passport.

Best practices for enrolling users in MFA
Enrolling users in MFA is essential for security, but enrollment can be a logistical challenge. We unpack best practices for enrollment in our blog.

A clear and present need: Bolster your identity security with threat detection and response
IT teams need an identity security program built on a strong foundation with the right tools. Learn how to design a program, and how to implement ITDR.

What are passkeys
Want to learn more about how passkeys provide secure access to protected resources? Learn how passkeys work and how they fit into a passwordless ecosystem.

3 steps to prevent a case of compromised credentials
We break down the precautionary measures and solutions to reduce the impact of credential compromise today as our passwords pose larger risks than ever.

Raising the bar: Duo redefines what is essential for access management
By combining strong authentication, attack-resistant MFA, Passwordless, SSO, and Trusted Endpoints all-in-one, Duo redefines access management.

MFA fatigue: What it is and how to respond
Multi-factor muthentication (MFA) fatigue is a new attack technique used by cybercriminals. Learn what organizations can do to protect against it.