Sponsored Content by Cisco

Why Identity Needs a Seat at the Cybersecurity Table

Last year, a stunning 74% of cybersecurity attacks involved social engineering, human errors, or misuse. It’s easy to see why attackers have capitalized on the human factor in the current environment: As strong as network perimeters have become, remote access has created a new landscape that needs to be defended differently, so attackers have pivoted to focus on the easier route—people and the devices we use. Whether the target is a CEO or a temporary contractor, the new reality is clear: Identity must now be treated as a full-blown cybersecurity perimeter.

“Exploiting a vulnerability requires a deep expertise and sophisticated tooling. Instead, attackers focus on what’s easy—and that’s usually breaching the identity,” says Iva Blazina Vukelja, VP of Product Management, Cisco Duo. “Even using multi-factor authentication, which is more secure than traditional passwords, attackers can exploit you if you’re using weaker forms of MFA. And because there is less visibility around those attacks, they’re harder to detect.”

Not all authenticators are equal

Multi-factor authentication (MFA) can mitigate risk by introducing additional hurdles for potential attacks, but the rise of identity-based cyberattacks has shown that simply enabling an additional factor does not make an account impenetrable. Strong cybersecurity requires visibility into identity systems activity, identity risk detection, and automated risk and trust driven controls, so that even if a user is targeted, the chances of an attacker completing the compromise are significantly lower. 

Identity and access management software like Cisco Duo meet market demands for both stricter security controls and ease of use, with state-of-the-art techniques to defend against sophisticated phishing, attacker-in-the-middle and push-bombing attacks that may compromise weaker forms of MFA. By providing greater visibility of the security perimeter, Vukelja says, it’s easier to recognize whether advanced MFA factors like passwordless authentication are covering all individuals and accounts—and if they haven’t, you can spring into action to secure those gaps before they’re compromised.

“You have to really understand what’s going on in that identity perimeter,” she explains. “You may roll out your MFA, but is everybody on it? It’s important to know if the controls you think you have rolled out have been adopted by all disparate workforce populations. And if not, think about mitigating controls.”

Why ITDR should be the top IT priority

Identity threat detection and response (ITDR) unlocks unprecedented visibility and observability across different identity systems. It also offers new calculations of risk signals based on identity data that were not previously possible to detect.

“Relying on weak forms of MFA, like SMS texts and push notifications, reminds me of a house with shabby locks,” Vukelja says. “It’s easier to break in and harder to tell who has entered. By comparison, identity threat detection and response allows comprehensive and correlated visibility into what is actually going on. It’s like adding a whole-house security system.”

Powered by advanced ITDR capabilities, identity and access management software like Cisco Duo can automatically detect and respond to advanced attacks such as session hijacking. Security teams are no longer limited to responding post-breach, and as risk signals are identified, they’re seamlessly integrated into your access security and management controls to make confident decisions in real time. This emerging innovation in identity security provides much-needed visibility into digital identities and automation of security responses based on risk analytics—all without adding unnecessary friction to the user experience.

“For the first time, the MFA can actually take a risk signal and automate a response without too much authenticating,” Vukelja says. “We can do that because Cisco Duo has this unprecedented observability that we use to automate breaking up trust and do that only when it’s needed. When we receive a risk signal, we can react quickly, protect the user, and provide security professionals visibility.” 

The rise of privacy-first cybersecurity

One key difference in Cisco Duo’s strategy for comprehensive identity protection is a total commitment to user privacy. By using a patented method to ascertain trust without intrusive GPS tracking, for example, Cisco Duo can monitor the identity perimeter without knowing a user’s exact location.

Most contextual access controls rely on IP addresses and geo locations, making the location signal noisy and ineffective when using VPNs. Enter Duo’s patent-pending WiFi Fingerprint technology: It creates an anonymized fingerprint of the wi-fi networks available to a user’s device to detect a change in location at the time of authentication. This helps to improve accuracy and reduce false-positives while preserving user privacy. If location has changed, Duo can automatically step up authentication requirements.

As attackers develop new methods to compromise digital identities and access, comprehensive protection of the identity perimeter will only become more essential for enterprises. That’s why IT leaders should swap out their “shabby door keys” and prioritize ITDR for greater visibility and observability of risk signals. Effective identity and access management software confirms device trust, user trust, and context trust, while providing the ability to automate agile access controls in real time, reacting to emerging risks without jeopardizing user privacy. 

The rapid maturation of cyberattacks highlights why identity security tools and strategies are crucial for both large and small enterprises. With identity now central to digital operations, organizations prioritizing strong yet frictionless identity and access management will benefit by staying ahead of threats and minimizing the possibility of future compromises. 

Ultimately, the most important step is recognizing identity as the foundation of effective cybersecurity. “Even the best cybersecurity strategy,” Vukelja insists, “is only as strong as its weakest point.”

Get a free identity security assessment with Cisco Duo.


This article is presented by TC Brand Studio. This is paid content, TechCrunch editorial was not involved in the development of this article. Reach out to learn more about partnering with TC Brand Studio.

More TechCrunch

For frontier AI models, when it rains, it pours. Mistral released a fresh new flagship model on Wednesday, Large 2, which it claims to be on par with the latest…

Mistral’s Large 2 is its answer to Meta and OpenAI’s latest models

Researchers at MIT CSAIL this week are showcasing a new method for training home robots in simulation.

Researchers are training home robots in simulations based on iPhone scans

Apple announced on Wednesday that Apple Maps is now available on the web via a public beta, which means you can now access the service directly from your browser. The…

Apple Maps launches on the web to challenge Google Maps

AltStore, an alternative app store, has launched its first batch of third-party iOS apps in the European Union. The rollout comes a few months after the company launched an updated…

Alternative app store AltStore PAL adds third-party iOS apps in wake of EU Apple ruling

Microsoft this afternoon previewed its answer to Google’s AI-powered search experiences: Bing generative search. Available for only a “small percentage” of users at the moment, Bing generative search, underpinned by…

Bing previews its answer to Google’s AI Overviews

Hiya, folks, welcome to TechCrunch’s regular AI newsletter. Last Sunday, President Joe Biden announced that he no longer plans to seek reelection, instead offering his “full endorsement” of VP Kamala…

This Week in AI: How Kamala Harris might regulate AI

But the fate of many generative AI businesses — even the best-funded ones — looks murky.

VCs are still pouring billions into generative AI startups

Thousands of stories have been written about former NFL quarterback and civil rights activist Colin Kaepernick. If anyone knows a thing or two about losing control of your own narrative,…

Colin Kaepernick lost control of his story. Now he wants to help creators own theirs

Several people who received the CrowdStrike offer found that the gift card didn’t work, while others got an error saying the voucher had been canceled.

CrowdStrike offers a $10 apology gift card to say sorry for outage

TikTok Lite, a low-bandwidth version of the video platform popular across Africa, Asia and Latin America, is exposing users to harmful content because of its lack of safety features compared…

TikTok Lite exposes users to harmful content, say Mozilla researchers

If the models continue eating each other’s data, perhaps without even knowing it, they’ll progressively get weirder and dumber until they collapse.

‘Model collapse’: Scientists warn against letting AI eat its own tail

Astranis has fully funded its next-generation satellite program, called Omega, after closing its $200 million Series D round, the company said Wednesday.  “This next satellite is really the milestone into…

Astranis is set to build Omega constellation after $200M Series D

Reworkd’s founders went viral on GitHub last year with AgentGPT, a free tool to build AI agents that acquired more than 100,000 daily users in a week. This earned them…

After AgentGPT’s success, Reworkd pivots to web-scraping AI agents

We’re so excited to announce that we’ve added a dedicated AI Stage presented by Google Cloud to TechCrunch Disrupt 2024. It joins Fintech, SaaS and Space as the other industry-focused…

Announcing the agenda for the AI Stage at TechCrunch Disrupt 2024

The firm has numerous legs to it, ranging from a venture studio to standard funds, where it does everything from co-founding companies to deploying capital.

CityRock launches second fund to back founders from diverse backgrounds

Since launching xAI last year, Elon Musk has been using X as a sandbox to test some of the Grok model’s AI capabilities. Beyond the basic chatbot, X uses the…

X launches underwhelming Grok-powered ‘More About This Account’ feature

Lakera, a Swiss startup that’s building technology to protect generative AI applications from malicious prompts and other threats, has raised $20 million in a Series A round led by European…

Lakera, which protects enterprises from LLM vulnerabilities, raises $20M

Alongside a slew of announcements for Play — such as AI-powered app comparisons and a feature that bundles similar apps — Google has introduced new “Curated Spaces,” hubs dedicated to…

Google Play gets ‘Comics’ feature for manga readers in Japan

Farmers have got to do something about pests. But nobody really likes the idea of using more chemical pesticides. Thomas Laurent’s company, Micropep, thinks the answer might already be in…

Micropep taps tiny proteins to make pesticides safer

Play Store is getting AI-powered app comparisons, automatically organized categories for similar apps, dedicated hubs for content, data personalization controls, support for playing multiple mobile games on PCs, and more…

Google adds AI-powered comparisons, collections and more data controls to Play Store

Vanta, a trust management platform that helps businesses automate much of their security and compliance processes, today announced that it has raised a $150 million Series C funding round led…

Vanta raises $150M Series C, now valued at $2.45B

The Overture Maps Foundation is today releasing data sets for 2.3B building “footprints” globally, 54M notable places of interest, a visual overlay of “boundaries,” and land and water features such…

Backed by Microsoft, AWS and Meta, the Overture Maps Foundation launches its first open map datasets

The startup is not disclosing its valuation, but sources close to the company say the figure is just under $400 million post-money.

Dazz snaps up $50M for AI-based, automated cloud security remediation

The outcome of the Spanish authority’s probe could take up to two years to complete, and leave Apple on the hook for fines in the billions.

Apple’s App Store hit with antitrust probe in Spain

Proton’s first cryptocurrency product is a wallet called Proton Wallet that’s designed to make it easier to get started with bitcoin.

Proton releases a self-custody bitcoin wallet

Dental care is a necessity, yet many patients lack confidence in their dentists’ ability to provide accurate diagnoses and appropriate treatments. Some dentists overtreat patients, leading to unnecessary expenses, while…

Pearl raises $58M to help dentists make better diagnoses using AI 

Exoticca’s platform connects flights, hotels, meals, transfers, transportation and more, plus the local companies at the destinations.

Spanish startup Exoticca raises a €60M Series D for its tour packages platform

Content creators are busy people. Most spend more than 20 hours a week creating new content for their respective corners of the web. That doesn’t leave much time for audience…

Mark Zuckerberg imagines content creators making AI clones of themselves

Elon Musk says he will show off Tesla’s purpose-built “robotaxi” prototype during an event October 10, after scrapping a previous plan to reveal it August 8. Musk said Tesla will…

Elon Musk sets new date for Tesla robotaxi reveal, calls everything beyond autonomy ‘noise’

Alphabet will spend an additional $5 billion on its self-driving subsidiary, Waymo, over the next few years, according to Ruth Porat, the company’s chief financial officer. Porat announced the commitment…

Alphabet to invest another $5B into Waymo