Duo Security
@duosec.bsky.social
📱 | Duo.com
🔑 | Duo is now a part of @Cisco.com
💚 | Human-Centered Security Solutions
🔑 | Duo is now a part of @Cisco.com
💚 | Human-Centered Security Solutions
Attn. Asia-Pacific customers: Cisco AI Assistant for Duo is expanding to Asia-Pacific
Security teams can bring smarter, faster identity security with enterprise-grade privacy and compliance.
Learn more in the blog: cs.co/633227VDqs
Security teams can bring smarter, faster identity security with enterprise-grade privacy and compliance.
Learn more in the blog: cs.co/633227VDqs
Duo AI Assistant expanding to Asia-Pacific | Duo Security
Cisco AI Assistant for Duo expands to Asia-Pacific, delivering smarter, faster identity security with enterprise-grade privacy and compliance.
cs.co
November 11, 2025 at 8:26 PM
Attn. Asia-Pacific customers: Cisco AI Assistant for Duo is expanding to Asia-Pacific
Security teams can bring smarter, faster identity security with enterprise-grade privacy and compliance.
Learn more in the blog: cs.co/633227VDqs
Security teams can bring smarter, faster identity security with enterprise-grade privacy and compliance.
Learn more in the blog: cs.co/633227VDqs
Every 39 seconds, there’s a new cyberattack somewhere in the world. With Duo, you’re already multi-FA-steps ahead. 😉
November 7, 2025 at 11:38 PM
Every 39 seconds, there’s a new cyberattack somewhere in the world. With Duo, you’re already multi-FA-steps ahead. 😉
AI is transforming how organizations manage identity data—turning complex queries into actionable insights in seconds.
Learn how in our latest blog: cs.co/633217OXgW
Learn how in our latest blog: cs.co/633217OXgW
November 6, 2025 at 9:00 PM
AI is transforming how organizations manage identity data—turning complex queries into actionable insights in seconds.
Learn how in our latest blog: cs.co/633217OXgW
Learn how in our latest blog: cs.co/633217OXgW
"But I already have a directory. Why change?"
We hear this question a lot. Ripping out and replacing core identity infrastructure is a massive undertaking.
That's why Duo Directory is designed for flexibility.
Learn more from @msspalert.bsky.social: cs.co/633237OXV3
We hear this question a lot. Ripping out and replacing core identity infrastructure is a massive undertaking.
That's why Duo Directory is designed for flexibility.
Learn more from @msspalert.bsky.social: cs.co/633237OXV3
Adopt a Security-first Approach to Identity with Duo Directory
Identity is at the center of the majority of breaches.
cs.co
November 6, 2025 at 7:20 PM
"But I already have a directory. Why change?"
We hear this question a lot. Ripping out and replacing core identity infrastructure is a massive undertaking.
That's why Duo Directory is designed for flexibility.
Learn more from @msspalert.bsky.social: cs.co/633237OXV3
We hear this question a lot. Ripping out and replacing core identity infrastructure is a massive undertaking.
That's why Duo Directory is designed for flexibility.
Learn more from @msspalert.bsky.social: cs.co/633237OXV3
What can you achieve in 30 days? Quite a lot, actually. Experience award-winning security with a 30-day free trial.
Activate in minutes: cs.co/6332973ELS
Activate in minutes: cs.co/6332973ELS
November 5, 2025 at 8:00 PM
What can you achieve in 30 days? Quite a lot, actually. Experience award-winning security with a 30-day free trial.
Activate in minutes: cs.co/6332973ELS
Activate in minutes: cs.co/6332973ELS
Trust starts with identity. Our new eBook explores how modern access solutions can restore confidence, strengthen protection, and simplify security for today’s hybrid workforce.
Download your copy here: cs.co/633217KUN9
Download your copy here: cs.co/633217KUN9
November 4, 2025 at 12:51 AM
Trust starts with identity. Our new eBook explores how modern access solutions can restore confidence, strengthen protection, and simplify security for today’s hybrid workforce.
Download your copy here: cs.co/633217KUN9
Download your copy here: cs.co/633217KUN9
Cybersecurity Awareness Month may be ending, but good security habits shouldn’t.
✅ See how Duo helps you stay protected all year long: cs.co/633277GhoL
#DuoIAM #PhishingSeasonIsOver #CyberSecurityMonth
✅ See how Duo helps you stay protected all year long: cs.co/633277GhoL
#DuoIAM #PhishingSeasonIsOver #CyberSecurityMonth
October 31, 2025 at 5:04 PM
Cybersecurity Awareness Month may be ending, but good security habits shouldn’t.
✅ See how Duo helps you stay protected all year long: cs.co/633277GhoL
#DuoIAM #PhishingSeasonIsOver #CyberSecurityMonth
✅ See how Duo helps you stay protected all year long: cs.co/633277GhoL
#DuoIAM #PhishingSeasonIsOver #CyberSecurityMonth
Why is role-based access control critical to your security stack? With enhanced Role-Based Access Control for subaccounts, Duo delivers even stronger security with high productivity.
Learn about RBAC and all its benefits in the latest blog: cs.co/6332771huv
Learn about RBAC and all its benefits in the latest blog: cs.co/6332771huv
Duo Blog: Discover Security Insights and News | Duo Security
Explore the Duo Blog for expert tips, security insights, and resources to stay updated on the latest in security and access management trends.
cs.co
October 30, 2025 at 7:43 PM
Why is role-based access control critical to your security stack? With enhanced Role-Based Access Control for subaccounts, Duo delivers even stronger security with high productivity.
Learn about RBAC and all its benefits in the latest blog: cs.co/6332771huv
Learn about RBAC and all its benefits in the latest blog: cs.co/6332771huv
It looks legitimate, but it’s phishing bait. 📧 An invoice. A résumé. A trap.
With Duo’s new IAM solution, cut the line before your users are reeled in.
Learn more: cs.co/6332071yfC
#PhishingSeasonIsOver
With Duo’s new IAM solution, cut the line before your users are reeled in.
Learn more: cs.co/6332071yfC
#PhishingSeasonIsOver
October 30, 2025 at 11:00 AM
It looks legitimate, but it’s phishing bait. 📧 An invoice. A résumé. A trap.
With Duo’s new IAM solution, cut the line before your users are reeled in.
Learn more: cs.co/6332071yfC
#PhishingSeasonIsOver
With Duo’s new IAM solution, cut the line before your users are reeled in.
Learn more: cs.co/6332071yfC
#PhishingSeasonIsOver
Read how Inductive Automation + Duo enhanced device trust, streamlined IAM, and built strong phishing resistance.
Read the case study: cs.co/633297E25c
#DuoIAM #PhishingResistance
Read the case study: cs.co/633297E25c
#DuoIAM #PhishingResistance
October 29, 2025 at 9:49 PM
Read how Inductive Automation + Duo enhanced device trust, streamlined IAM, and built strong phishing resistance.
Read the case study: cs.co/633297E25c
#DuoIAM #PhishingResistance
Read the case study: cs.co/633297E25c
#DuoIAM #PhishingResistance
We've all heard of phishing...but have you heard of vishing?
A vishing attack uses phone calls or voice messages to trick you into revealing sensitive information.
Cybercriminals often impersonate trusted organizations, creating a false sense of urgency or fear to manipulate their targets.
A vishing attack uses phone calls or voice messages to trick you into revealing sensitive information.
Cybercriminals often impersonate trusted organizations, creating a false sense of urgency or fear to manipulate their targets.
October 29, 2025 at 11:03 AM
We've all heard of phishing...but have you heard of vishing?
A vishing attack uses phone calls or voice messages to trick you into revealing sensitive information.
Cybercriminals often impersonate trusted organizations, creating a false sense of urgency or fear to manipulate their targets.
A vishing attack uses phone calls or voice messages to trick you into revealing sensitive information.
Cybercriminals often impersonate trusted organizations, creating a false sense of urgency or fear to manipulate their targets.
In our latest blog, find out if end-to-end phishing resistance is a stretch goal, or a short-term reality. Read more and secure your organization’s identity lifecycle: cs.co/633247D9OQ
💡 P.S. Free guide available in the blog for download!
#PhishingResistance #MFA #DuoIAM
💡 P.S. Free guide available in the blog for download!
#PhishingResistance #MFA #DuoIAM
End-to-End Phishing Resistance: Stretch Goal or Reality? | Duo Security
Discover strategies to achieve end-to-end phishing resistance and secure your organization’s identity lifecycle. Download the free guide today!
cs.co
October 28, 2025 at 6:39 PM
In our latest blog, find out if end-to-end phishing resistance is a stretch goal, or a short-term reality. Read more and secure your organization’s identity lifecycle: cs.co/633247D9OQ
💡 P.S. Free guide available in the blog for download!
#PhishingResistance #MFA #DuoIAM
💡 P.S. Free guide available in the blog for download!
#PhishingResistance #MFA #DuoIAM
Using AWS investments with Duo? This webinar is for you. Designed for security professionals and organizations from SMB to Enterprise, learn how to build a robust Zero Trust identity security framework for your AWS environment and beyond.
Join us on October 28th: cs.co/6332078cfQ
Join us on October 28th: cs.co/6332078cfQ
October 27, 2025 at 11:55 PM
Using AWS investments with Duo? This webinar is for you. Designed for security professionals and organizations from SMB to Enterprise, learn how to build a robust Zero Trust identity security framework for your AWS environment and beyond.
Join us on October 28th: cs.co/6332078cfQ
Join us on October 28th: cs.co/6332078cfQ
We're busting some of the biggest myths about going passwordless with our friends @talosintelligence.com 🧐
Any of these surprise you?
Swipe through to see them all and check out their blog for more👇
Any of these surprise you?
Swipe through to see them all and check out their blog for more👇
As a special treat for Cybersecurity Awareness Month, @duosec.bsky.social is joining us to bust five common myths about going passwordless.
October 27, 2025 at 8:09 PM
We're busting some of the biggest myths about going passwordless with our friends @talosintelligence.com 🧐
Any of these surprise you?
Swipe through to see them all and check out their blog for more👇
Any of these surprise you?
Swipe through to see them all and check out their blog for more👇
We surveyed 650 Security and IT leaders across North America and Europe to uncover the stark realities and hidden vulnerabilities of today’s identity security postures.
We found an urgent need for organizations. Read the findings: cs.co/63325ACttl
We found an urgent need for organizations. Read the findings: cs.co/63325ACttl
October 23, 2025 at 6:56 PM
We surveyed 650 Security and IT leaders across North America and Europe to uncover the stark realities and hidden vulnerabilities of today’s identity security postures.
We found an urgent need for organizations. Read the findings: cs.co/63325ACttl
We found an urgent need for organizations. Read the findings: cs.co/63325ACttl
Managing user access just got easier. With User-Group Policy and Bulk Apply, you can:
- Scale changes across your organization effortlessly
- Save time on repetitive tasks
- Keep access policies consistent, all from the Policy page
See the updates in the blog: cs.co/63326A7Nnq
- Scale changes across your organization effortlessly
- Save time on repetitive tasks
- Keep access policies consistent, all from the Policy page
See the updates in the blog: cs.co/63326A7Nnq
User-Group Policy & Bulk Apply: Smarter Policy Management | Duo Security
Discover how User-Group Policy and Bulk Apply make it easier to manage access, scale changes, and save time — all from the Policy page.
cs.co
October 22, 2025 at 11:24 PM
Managing user access just got easier. With User-Group Policy and Bulk Apply, you can:
- Scale changes across your organization effortlessly
- Save time on repetitive tasks
- Keep access policies consistent, all from the Policy page
See the updates in the blog: cs.co/63326A7Nnq
- Scale changes across your organization effortlessly
- Save time on repetitive tasks
- Keep access policies consistent, all from the Policy page
See the updates in the blog: cs.co/63326A7Nnq
See how security-first IAM can be phased in—no rip-and-replace needed. Duo streamlines MFA, SSO, device trust, and third-party management out-of-the-box.
Read the latest blog: cs.co/63329AAQiZ
Read the latest blog: cs.co/63329AAQiZ
How to Evolve to “Security-First” IAM | Duo Security
See how security-first IAM can be phased in—no rip-and-replace needed. Duo streamlines MFA, SSO, device trust, and third-party management out-of-the-box.
cs.co
October 21, 2025 at 7:24 PM
See how security-first IAM can be phased in—no rip-and-replace needed. Duo streamlines MFA, SSO, device trust, and third-party management out-of-the-box.
Read the latest blog: cs.co/63329AAQiZ
Read the latest blog: cs.co/63329AAQiZ
Is your IAM truly secure? Learn why security-first IAM with default MFA and device trust is key to preventing identity-based cyberattacks.
More in the blog: cs.co/63329A0cDJ
More in the blog: cs.co/63329A0cDJ
Why IAM Should Put Security First | Duo Security
Is your IAM truly secure? Learn why security-first IAM with default MFA and device trust is key to preventing identity-based cyberattacks.
cs.co
October 15, 2025 at 11:22 PM
Is your IAM truly secure? Learn why security-first IAM with default MFA and device trust is key to preventing identity-based cyberattacks.
More in the blog: cs.co/63329A0cDJ
More in the blog: cs.co/63329A0cDJ
From AI-assisted deployment to phishing-resistant proximity verification, Duo is redefining how organizations secure access while keeping users productive.
See these innovations and more in action at Authenticate 2025 | Booth #314: cs.co/63324Axb64
See these innovations and more in action at Authenticate 2025 | Booth #314: cs.co/63324Axb64
October 13, 2025 at 6:34 PM
From AI-assisted deployment to phishing-resistant proximity verification, Duo is redefining how organizations secure access while keeping users productive.
See these innovations and more in action at Authenticate 2025 | Booth #314: cs.co/63324Axb64
See these innovations and more in action at Authenticate 2025 | Booth #314: cs.co/63324Axb64
Curious what we mean by end-to-end phishing resistance? Get a sneak peek from Matt Caulfield, and see it all in action at #Authenticate2025✨
Explore how we are transforming Identity and Access Management with seamless and secure authentication: cs.co/63329AsCXS
Explore how we are transforming Identity and Access Management with seamless and secure authentication: cs.co/63329AsCXS
October 9, 2025 at 11:48 PM
Curious what we mean by end-to-end phishing resistance? Get a sneak peek from Matt Caulfield, and see it all in action at #Authenticate2025✨
Explore how we are transforming Identity and Access Management with seamless and secure authentication: cs.co/63329AsCXS
Explore how we are transforming Identity and Access Management with seamless and secure authentication: cs.co/63329AsCXS
Attackers are finding new ways to exploit familiar tools. Cisco Talos recently spoke with ITBrew about how bad actors are leveraging collaboration platforms for old-school scams like spoofed calls.
Stay aware, stay protected: cs.co/63324AsWer
Stay aware, stay protected: cs.co/63324AsWer
How AI is reshaping cybersecurity
“If our barrier to entry is lower, so is the attackers’—and their ability to develop exploits and develop new command and control capabilities,” Splunk CISO says.
cs.co
October 9, 2025 at 6:10 PM
Attackers are finding new ways to exploit familiar tools. Cisco Talos recently spoke with ITBrew about how bad actors are leveraging collaboration platforms for old-school scams like spoofed calls.
Stay aware, stay protected: cs.co/63324AsWer
Stay aware, stay protected: cs.co/63324AsWer
Cloud content management company Box relies on Duo to help them block 100% of unauthorized access attempts.
Read the full study and learn how Duo sets high bar for security: cs.co/63327ASeJH
#SecurityStandards #Duo #Identity #MFA #CustomerSuccess
Read the full study and learn how Duo sets high bar for security: cs.co/63327ASeJH
#SecurityStandards #Duo #Identity #MFA #CustomerSuccess
October 8, 2025 at 10:12 PM
Cloud content management company Box relies on Duo to help them block 100% of unauthorized access attempts.
Read the full study and learn how Duo sets high bar for security: cs.co/63327ASeJH
#SecurityStandards #Duo #Identity #MFA #CustomerSuccess
Read the full study and learn how Duo sets high bar for security: cs.co/63327ASeJH
#SecurityStandards #Duo #Identity #MFA #CustomerSuccess
Unless they’re literally next to you, those hackers are out of luck.
Duo’s end-to-end phishing resistance includes proximity verification, which uses biometrics and Bluetooth to confirm it’s really you.
Try it out for free: cs.co/63326ASnPG
Duo’s end-to-end phishing resistance includes proximity verification, which uses biometrics and Bluetooth to confirm it’s really you.
Try it out for free: cs.co/63326ASnPG
October 8, 2025 at 7:51 PM
Unless they’re literally next to you, those hackers are out of luck.
Duo’s end-to-end phishing resistance includes proximity verification, which uses biometrics and Bluetooth to confirm it’s really you.
Try it out for free: cs.co/63326ASnPG
Duo’s end-to-end phishing resistance includes proximity verification, which uses biometrics and Bluetooth to confirm it’s really you.
Try it out for free: cs.co/63326ASnPG
From pilot to global launch, here’s how we tested Duo Directory at Black Hat:
- BH Europe 2024: Pilot
- BH Asia 2025: Full deployment (20–30 users)
- BH USA 2025: 100+ users
- Official launch
Read the full story: cs.co/63321AqzoF
- BH Europe 2024: Pilot
- BH Asia 2025: Full deployment (20–30 users)
- BH USA 2025: 100+ users
- Official launch
Read the full story: cs.co/63321AqzoF
October 7, 2025 at 11:41 PM
From pilot to global launch, here’s how we tested Duo Directory at Black Hat:
- BH Europe 2024: Pilot
- BH Asia 2025: Full deployment (20–30 users)
- BH USA 2025: 100+ users
- Official launch
Read the full story: cs.co/63321AqzoF
- BH Europe 2024: Pilot
- BH Asia 2025: Full deployment (20–30 users)
- BH USA 2025: 100+ users
- Official launch
Read the full story: cs.co/63321AqzoF
Duo’s AI and Security Research Team takes a hard look at when attackers attempt to bypass MFA by adding devices they control as MFA factors.
See what they found: cs.co/63325AUsoX
#AI #Security #MFA
See what they found: cs.co/63325AUsoX
#AI #Security #MFA
Device bait and switch: A case of device replacement | Duo Security
Duo’s AI and Security Research Team takes a hard look at when attackers attempt to bypass MFA by adding devices they control as MFA factors.
cs.co
October 7, 2025 at 3:57 PM
Duo’s AI and Security Research Team takes a hard look at when attackers attempt to bypass MFA by adding devices they control as MFA factors.
See what they found: cs.co/63325AUsoX
#AI #Security #MFA
See what they found: cs.co/63325AUsoX
#AI #Security #MFA