Sponsored Content by Cisco

Why Identity Needs a Seat at the Cybersecurity Table

Last year, a stunning 74% of cybersecurity attacks involved social engineering, human errors, or misuse. It’s easy to see why attackers have capitalized on the human factor in the current environment: As strong as network perimeters have become, remote access has created a new landscape that needs to be defended differently, so attackers have pivoted to focus on the easier route—people and the devices we use. Whether the target is a CEO or a temporary contractor, the new reality is clear: Identity must now be treated as a full-blown cybersecurity perimeter.

“Exploiting a vulnerability requires a deep expertise and sophisticated tooling. Instead, attackers focus on what’s easy—and that’s usually breaching the identity,” says Iva Blazina Vukelja, VP of Product Management, Cisco Duo. “Even using multi-factor authentication, which is more secure than traditional passwords, attackers can exploit you if you’re using weaker forms of MFA. And because there is less visibility around those attacks, they’re harder to detect.”

Not all authenticators are equal

Multi-factor authentication (MFA) can mitigate risk by introducing additional hurdles for potential attacks, but the rise of identity-based cyberattacks has shown that simply enabling an additional factor does not make an account impenetrable. Strong cybersecurity requires visibility into identity systems activity, identity risk detection, and automated risk and trust driven controls, so that even if a user is targeted, the chances of an attacker completing the compromise are significantly lower. 

Identity and access management software like Cisco Duo meet market demands for both stricter security controls and ease of use, with state-of-the-art techniques to defend against sophisticated phishing, attacker-in-the-middle and push-bombing attacks that may compromise weaker forms of MFA. By providing greater visibility of the security perimeter, Vukelja says, it’s easier to recognize whether advanced MFA factors like passwordless authentication are covering all individuals and accounts—and if they haven’t, you can spring into action to secure those gaps before they’re compromised.

“You have to really understand what’s going on in that identity perimeter,” she explains. “You may roll out your MFA, but is everybody on it? It’s important to know if the controls you think you have rolled out have been adopted by all disparate workforce populations. And if not, think about mitigating controls.”

Why ITDR should be the top IT priority

Identity threat detection and response (ITDR) unlocks unprecedented visibility and observability across different identity systems. It also offers new calculations of risk signals based on identity data that were not previously possible to detect.

“Relying on weak forms of MFA, like SMS texts and push notifications, reminds me of a house with shabby locks,” Vukelja says. “It’s easier to break in and harder to tell who has entered. By comparison, identity threat detection and response allows comprehensive and correlated visibility into what is actually going on. It’s like adding a whole-house security system.”

Powered by advanced ITDR capabilities, identity and access management software like Cisco Duo can automatically detect and respond to advanced attacks such as session hijacking. Security teams are no longer limited to responding post-breach, and as risk signals are identified, they’re seamlessly integrated into your access security and management controls to make confident decisions in real time. This emerging innovation in identity security provides much-needed visibility into digital identities and automation of security responses based on risk analytics—all without adding unnecessary friction to the user experience.

“For the first time, the MFA can actually take a risk signal and automate a response without too much authenticating,” Vukelja says. “We can do that because Cisco Duo has this unprecedented observability that we use to automate breaking up trust and do that only when it’s needed. When we receive a risk signal, we can react quickly, protect the user, and provide security professionals visibility.” 

The rise of privacy-first cybersecurity

One key difference in Cisco Duo’s strategy for comprehensive identity protection is a total commitment to user privacy. By using a patented method to ascertain trust without intrusive GPS tracking, for example, Cisco Duo can monitor the identity perimeter without knowing a user’s exact location.

Most contextual access controls rely on IP addresses and geo locations, making the location signal noisy and ineffective when using VPNs. Enter Duo’s patent-pending WiFi Fingerprint technology: It creates an anonymized fingerprint of the wi-fi networks available to a user’s device to detect a change in location at the time of authentication. This helps to improve accuracy and reduce false-positives while preserving user privacy. If location has changed, Duo can automatically step up authentication requirements.

As attackers develop new methods to compromise digital identities and access, comprehensive protection of the identity perimeter will only become more essential for enterprises. That’s why IT leaders should swap out their “shabby door keys” and prioritize ITDR for greater visibility and observability of risk signals. Effective identity and access management software confirms device trust, user trust, and context trust, while providing the ability to automate agile access controls in real time, reacting to emerging risks without jeopardizing user privacy. 

The rapid maturation of cyberattacks highlights why identity security tools and strategies are crucial for both large and small enterprises. With identity now central to digital operations, organizations prioritizing strong yet frictionless identity and access management will benefit by staying ahead of threats and minimizing the possibility of future compromises. 

Ultimately, the most important step is recognizing identity as the foundation of effective cybersecurity. “Even the best cybersecurity strategy,” Vukelja insists, “is only as strong as its weakest point.”

Get a free identity security assessment with Cisco Duo.


This article is presented by TC Brand Studio. This is paid content, TechCrunch editorial was not involved in the development of this article. Reach out to learn more about partnering with TC Brand Studio.

More TechCrunch

Meta announced on Wednesday that users aged 10 to 12 will soon be able to interact with others in VR if they have their parents’ approval to do so. Up…

Meta will soon let kids aged 10 to 12 interact with others in VR with their parents’ approval

GenAI is everywhere these days, but Amazon Web Services has been perceived in some circles as being late to the game. In reality it’s still early, and the market is…

AWS App Studio promises to generate enterprise apps from a written prompt

Cybersecurity experts are criticizing Microsoft for data breach notification emails that are confusing customers.

Microsoft emails that warned customers of Russian hacks criticized for looking like spam and phishing

After securing $14 million for its second fund in 2023, early-stage VC firm Kearny Jackson is back with a third fund.

Marc Andreessen, Sequoia again back Kearny Jackson, this time in $65M Fund III

The question now is whether Spotify will add something similar for music artists in the future.

Spotify is no longer just a streaming app, it’s a social network

The core issue relates to a 2019 licensing change whereby Microsoft made it more expensive to run Microsoft’s enterprise software on rival cloud services.

Microsoft settles with European cloud trade body over antitrust complaints

He’s known by a single-syllable name: Pomp. But his story is of an unconventional rise to success that almost ended two years after it began.

From Facebook to the face of crypto: Inside Anthony Pompliano’s wild career

As TikTok continues to test the waters with longer videos, Instagram Head Adam Mosseri has said the Meta-owned social network will continue to focus on short-form content. In an Instagram…

While TikTok chases YouTube, Instagram vows to focus on short-form content

Are you a Series A to B startup aiming to make a big splash in the tech world? Look no further than the ScaleUp Startups Exhibitor Program at TechCrunch Disrupt…

Elevate your startup with the ScaleUp Program at TechCrunch Disrupt 2024

While Samsung has maintained its own familiar design with the standard Galaxy Buds 3, the Pro are experiencing a sort of Apple identity crisis.

Samsung unveils Galaxy Buds 3 Pro and Buds 3, available for preorder now and shipping July 24

At Unpacked 2024, the company shared more details about the Galaxy Ring, which represents the first take on the category from a hardware giant.

Samsung’s Galaxy Ring, its first smart ring, arrives July 24 for $399

At the heart of the features is the Snapdragon 8 Gen 3, which is the same system on a chip that powered the Galaxy S24.

Samsung Galaxy Z Fold and Z Flip 6 arrive with Galaxy AI and Google Gemini

Vimeo joins TikTok, YouTube and Meta in implementing a way for creators to label AI-generated content. The video hosting service announced on Wednesday that creators must now disclose to viewers…

Vimeo joins YouTube and TikTok in launching new AI content labels

The search giant is updating its Gemini for Android app to be more suitable for foldables with the ability to use Gemini with overlay and split screen interfaces.

Google brings new Gemini features and Wear OS 5 to Samsung devices

The European Union has designated adult content website XNXX as subject to the strictest level of content regulation under the bloc’s Digital Services Act (DSA) after it notified the bloc…

XNXX joins handful of adult sites subject to EU’s strictest content moderation rules

This likely rules out reports of Apple gaining an observer seat.

As Microsoft leaves its observer seat, OpenAI says it won’t have any more observers

SaaS founders trying to figure out what it takes to raise their next round can refer to Point Nine’s famous yearly SaaS Funding Napkin. (The term refers to “back of…

Deep tech startups with very technical CEOs raise larger rounds, research finds

Iceland’s startup scene is punching above its weight. That’s perhaps in part because it kept the 2021 hype in check, but mostly because its tech ecosystem is coming of age.…

Iceland is dodging the VC doldrums as Frumtak Ventures lands $87M for its fourth fund

Index Ventures is announcing $2.3 billion in new funds to finance the next generation of tech startups globally. These new funds are spread across different stages with $800 million dedicated…

Index Ventures raises $2.3B for new venture and growth funds

Prompt engineering became a hot job last year in the AI industry, but it seems Anthropic is now developing tools to at least partially automate it. Anthropic released several new…

Anthropic’s Claude adds a prompt playground to quickly improve your AI apps

Hebbia, a startup that uses generative AI to search large documents and respond to large questions, has raised a $130 million Series B at a roughly $700 million valuation led…

AI startup Hebbia raised $130M at a $700M valuation on $13 million of profitable revenue

NovoNutrients has raised a $18 million Series A round from investors to build a pilot-scale facility to prove that its fermentation process works at scale.

NovoNutrients tweaks its bugs to turn CO2 into protein for people and pets

Seven years ago, Uber and Lyft blocked an effort to require ride-hailing app drivers to get fingerprinted in California. But by launching Uber for Teens earlier this year, the company…

Uber for Teens has reignited an old debate over fingerprinting drivers

Fast-food chain Whataburger’s app has gone viral in the wake of Hurricane Beryl, which left around 1.8 million utility customers in Houston, Texas without power. Hundreds of thousands of those…

Whataburger app becomes unlikely power outage map after Houston hurricane

Bumble’s new reporting option arrives at a time when, unfortunately, AI-generated photos on dating apps are common

Bumble users can now report profiles that use AI-generated photos

The concept of Airchat is fun, especially if you’re someone who loves to send voice memos instead of typing out long paragraphs on your phone keyboard.

Talky social app Airchat gets a major overhaul, making it more like an asynchronous Clubhouse

Here is a timeline of the events that led fledgling automaker Fisker to file for bankruptcy.

The fall of EV startup Fisker: A comprehensive timeline

Ahead of these potential competitors comes Openvibe, a simple aggregator for the open social web.

Openvibe combines Mastodon, Bluesky and Nostr into one social app

Welcome to TechCrunch Fintech! Last week was a holiday in the United States, so news was a bit lighter than normal. But there was still fintech-related items to report, including…

Should venture capitalists be held accountable when startups screw up?

Fisker Inc. co-founders Henrik Fisker and his wife, Geeta Gupta-Fisker, are lowering their salaries to $1 in order to keep their failed EV startup’s bankruptcy proceedings funded, as lawyers work…

Henrik Fisker drops salary to $1 to keep Fisker Inc. bankruptcy case alive