Sponsored Content by Cisco

Why Identity Needs a Seat at the Cybersecurity Table

Last year, a stunning 74% of cybersecurity attacks involved social engineering, human errors, or misuse. It’s easy to see why attackers have capitalized on the human factor in the current environment: As strong as network perimeters have become, remote access has created a new landscape that needs to be defended differently, so attackers have pivoted to focus on the easier route—people and the devices we use. Whether the target is a CEO or a temporary contractor, the new reality is clear: Identity must now be treated as a full-blown cybersecurity perimeter.

“Exploiting a vulnerability requires a deep expertise and sophisticated tooling. Instead, attackers focus on what’s easy—and that’s usually breaching the identity,” says Iva Blazina Vukelja, VP of Product Management, Cisco Duo. “Even using multi-factor authentication, which is more secure than traditional passwords, attackers can exploit you if you’re using weaker forms of MFA. And because there is less visibility around those attacks, they’re harder to detect.”

Not all authenticators are equal

Multi-factor authentication (MFA) can mitigate risk by introducing additional hurdles for potential attacks, but the rise of identity-based cyberattacks has shown that simply enabling an additional factor does not make an account impenetrable. Strong cybersecurity requires visibility into identity systems activity, identity risk detection, and automated risk and trust driven controls, so that even if a user is targeted, the chances of an attacker completing the compromise are significantly lower. 

Identity and access management software like Cisco Duo meet market demands for both stricter security controls and ease of use, with state-of-the-art techniques to defend against sophisticated phishing, attacker-in-the-middle and push-bombing attacks that may compromise weaker forms of MFA. By providing greater visibility of the security perimeter, Vukelja says, it’s easier to recognize whether advanced MFA factors like passwordless authentication are covering all individuals and accounts—and if they haven’t, you can spring into action to secure those gaps before they’re compromised.

“You have to really understand what’s going on in that identity perimeter,” she explains. “You may roll out your MFA, but is everybody on it? It’s important to know if the controls you think you have rolled out have been adopted by all disparate workforce populations. And if not, think about mitigating controls.”

Why ITDR should be the top IT priority

Identity threat detection and response (ITDR) unlocks unprecedented visibility and observability across different identity systems. It also offers new calculations of risk signals based on identity data that were not previously possible to detect.

“Relying on weak forms of MFA, like SMS texts and push notifications, reminds me of a house with shabby locks,” Vukelja says. “It’s easier to break in and harder to tell who has entered. By comparison, identity threat detection and response allows comprehensive and correlated visibility into what is actually going on. It’s like adding a whole-house security system.”

Powered by advanced ITDR capabilities, identity and access management software like Cisco Duo can automatically detect and respond to advanced attacks such as session hijacking. Security teams are no longer limited to responding post-breach, and as risk signals are identified, they’re seamlessly integrated into your access security and management controls to make confident decisions in real time. This emerging innovation in identity security provides much-needed visibility into digital identities and automation of security responses based on risk analytics—all without adding unnecessary friction to the user experience.

“For the first time, the MFA can actually take a risk signal and automate a response without too much authenticating,” Vukelja says. “We can do that because Cisco Duo has this unprecedented observability that we use to automate breaking up trust and do that only when it’s needed. When we receive a risk signal, we can react quickly, protect the user, and provide security professionals visibility.” 

The rise of privacy-first cybersecurity

One key difference in Cisco Duo’s strategy for comprehensive identity protection is a total commitment to user privacy. By using a patented method to ascertain trust without intrusive GPS tracking, for example, Cisco Duo can monitor the identity perimeter without knowing a user’s exact location.

Most contextual access controls rely on IP addresses and geo locations, making the location signal noisy and ineffective when using VPNs. Enter Duo’s patent-pending WiFi Fingerprint technology: It creates an anonymized fingerprint of the wi-fi networks available to a user’s device to detect a change in location at the time of authentication. This helps to improve accuracy and reduce false-positives while preserving user privacy. If location has changed, Duo can automatically step up authentication requirements.

As attackers develop new methods to compromise digital identities and access, comprehensive protection of the identity perimeter will only become more essential for enterprises. That’s why IT leaders should swap out their “shabby door keys” and prioritize ITDR for greater visibility and observability of risk signals. Effective identity and access management software confirms device trust, user trust, and context trust, while providing the ability to automate agile access controls in real time, reacting to emerging risks without jeopardizing user privacy. 

The rapid maturation of cyberattacks highlights why identity security tools and strategies are crucial for both large and small enterprises. With identity now central to digital operations, organizations prioritizing strong yet frictionless identity and access management will benefit by staying ahead of threats and minimizing the possibility of future compromises. 

Ultimately, the most important step is recognizing identity as the foundation of effective cybersecurity. “Even the best cybersecurity strategy,” Vukelja insists, “is only as strong as its weakest point.”

Get a free identity security assessment with Cisco Duo.

This sponsored article is brought to you in partnership with Cisco. Learn more about partnering with TC Brand Studio.

More TechCrunch

Fisker is just a few days into its Chapter 11 bankruptcy, and the fight over its assets is already charged, with one lawyer claiming the startup has been liquidating assets…

The fight over Fisker’s assets is already heating up

A hacker is advertising customer data allegedly stolen from the Australia-based live events and ticketing company TEG on a well-known hacking forum. On Thursday, a hacker put up for sale…

Hacker claims to have 30 million customer records from Australian ticket seller giant TEG

Welcome to Startups Weekly — Haje‘s weekly recap of everything you can’t miss from the world of startups. Sign up here to get it in your inbox every Friday. Elon…

Tesla makes Musk best-paid CEO of all time and Fisker bites the dust

Dot is a new AI companion and chatbot that thrives on getting to know your innermost thoughts and feelings.

Dot’s AI really, really wants to get to know you

The e-fuels startup is working on producing fuel for aviation and maritime shipping using carbon dioxide and other waste carbon streams.

E-fuels startup Aether Fuels is raising $34.3 million, per filing

Fisker was facing “potential financial distress” as early as last August, according to a new filing in its Chapter 11 bankruptcy proceeding, which the EV startup initiated earlier this week.…

Fisker faced financial distress as early as last August

Cruise, the self-driving subsidiary of General Motors, has agreed to pay a $112,500 fine for failing to provide full information about an accident involving one of its robotaxis last year.…

Cruise clears key hurdle to getting robotaxis back on roads in California

Feel Therapeutics has a pretty original deck, with some twists we rarely see; the company did a great job telling the overall story.

Pitch Deck Teardown: Feel Therapeutics’ $3.5M seed deck

The Rockset buy fits into OpenAI’s broader recent strategy of investing heavily in its enterprise sales and tech orgs.

OpenAI buys Rockset to bolster its enterprise AI

The U.S. government announced sanctions against 12 executives and senior leaders of the Russia-based cybersecurity giant Kaspersky. In a press release, the Department of the Treasury’s Office of Foreign Assets…

US government sanctions Kaspersky executives

Style DNA, an AI-powered fashion stylist app, creates a personalized style profile from a single selfie. The app is particularly useful for people interested in seasonal color analysis, a process…

Style DNA gets a generative AI chatbot that suggests outfit ideas based on your color type

Rates of depression, anxiety and suicidal thoughts are surging among U.S. teens. A recent report from the Center of Disease Control found that nearly one in three girls have seriously…

Khosla-backed Marble, built by former Headway founders, offers affordable group therapy for teens

Cover says what sets it apart is the underlying technology it employs, which has been exclusively licensed from NASA’s Jet Propulsion Laboratory.

A new startup from Figure’s founder is licensing NASA tech in a bid to curb school shootings

Spotify is introducing a new “Basic” streaming plan in the United States, the company announced on Friday. The new plan costs $10.99 per month and includes all of the benefits…

Spotify launches a new Basic streaming plan in the US

Photographers say the social media giant is applying a ‘Made with AI’ label to photos they took, causing confusion for users.

Meta is tagging real photos as ‘Made with AI,’ say photographers

Website building platform Squarespace is selling Tock, its restaurant reservation service, to American Express in a deal worth $400 million — the exact figure that Squarespace paid for the service…

Squarespace sells restaurant reservation system Tock to American Express for $400M

The February ransomware attack on UHG-owned Change Healthcare stands as one of the largest-ever known digital thefts of U.S. medical records.

Change Healthcare confirms ransomware hackers stole medical records on a ‘substantial proportion’ of Americans

Google said today that it globally paused its experiment that aimed to allow new kinds of real-money games on the Play Store, citing the challenges that come with the lack…

Google pauses its experiment to expand real-money games on the Play Store

Venture firms raised $9.3 billion in Q1 according to PitchBook data, which means this year likely won’t match or surpass 2023’s $81.8 billion total. While emerging managers are feeling the…

Kevin Hartz’s A* raises its second oversubscribed fund in three years

Google is making reviews of all your movies, TV shows, books, albums and games visible under one profile page starting June 24, according to an email sent to users last…

Google is making your movie and TV reviews visible under a new profile page

Zepto, an Indian quick commerce startup, has more than doubled its valuation to $3.6 billion in a new funding round of $665 million.

Zepto, a 10-minute delivery app, raises $665M at $3.6B valuation

Speak, the AI-powered language learning app, has raised new money from investors at double its previous valuation.

Language learning app Speak nets $20M, doubles valuation

SpaceX unveiled Starlink Mini, a more portable version of its satellite internet product that is small enough to fit inside a backpack.  Early Starlink customers were invited to purchase the…

SpaceX debuts portable Starlink Mini for $599

Ali Rathod-Papier has stepped down from her role as global head of compliance at corporate card expense management startup Brex to join venture firm Andreessen Horowitz (a16z) as a partner…

Brex’s compliance head has left the fintech startup to join Andreessen Horowitz as a partner

U.S. officials imposed the “first of its kind” ban arguing that Kaspersky threatens U.S. national security because of its links to Russia.

US bans sale of Kaspersky software citing security risk from Russia 

Apple has released Final Cut Pro for iPad 2 and Final Cut Camera, the company announced on Thursday. Both apps were previously announced during the company’s iPad event in May.…

Apple releases Final Cut Pro for iPad 2 and Final Cut Camera

Paris has quickly established itself as a major European center for AI startups, and now another big deal is in the works.

Poolside is raising $400M+ at a $2B valuation to build a supercharged coding co-pilot

The space industry is all abuzz about how SpaceX’s Starship, Blue Origin’s New Glenn, and other heavy-lift rockets will change just about everything. One likely consequence is that spacecraft will…

Gravitics prepares a testing gauntlet for a new generation of giant spacecraft

LTK (formerly LiketoKnow.it and RewardStyle), the influencer shopping app with 40 million monthly users, announced on Thursday the launch of a free direct message tool for creators to instantly share…

Influencer shopping app LTK gets an automatic direct message tool

YouTube appears to be taking a firm stance against Premium subscribers who attempt to use a VPN (virtual private network) to access cheaper subscription prices in other countries. This week,…

YouTube confirms crackdown on VPN users accessing cheaper Premium plans