Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 22 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

A Vulnerability Management Program is Nothing Without Identity Risk Protection

Highlights from the 'Identity is the New Perimeter: How to Discover, Mitigate and Protect Identity Risks' talk given by Tim Nursall, Sales Engineer in S&M; Field Engineering at Illusive, at Infosecurity Europe 2022

by Katrielle Soussana
July 1, 2022
in Featured
A Vulnerability Management Program is Nothing Without Identity Risk Protection
Share on FacebookShare on Twitter

“Identity is the number one security concern.” Tim Nursall, Field Engineer at Illusive spoke at Infosecurity Europe last week on identity risk and the Analysing Identity Risks Report.  

— 

So, what is identity risk? With the migration of networks to the cloud and the overall shift towards remote work and off-premises devices, the historically understood network perimeter has changed entirely. Through endpoint vulnerabilities and privileged credentials, attackers can now breach a system through a multitude of doors.  

The Analysing Identity Risks (AIR) report, presented by Tim Nursall of Illusive Networks, elucidates the patterns and security weaknesses of companies as they pertain to identity risks. These are, in fact, more common than one might imagine! 

Nursall explained the danger of identity risk through data collected for this report. It was found that 100% of Illusive audits showed privileged identity risks and that one out of six endpoints and servers have exploitative identity risks. Additionally, the audits determined that 87% of local administrators remained unenrolled in privileged account management solutions and that 55% of exposed privileged identity credentials were stored in browsers. Easily accessible browsers. 

And what about passwords? According to the Illusive audits, 62% of local administrator passwords had remained unchanged for more than one year, 17% for more than five years, and 1% for over ten years. Ten! 

There is also a trend towards the misconfiguration of privileged identity access in companies that AIR has analysed. 40% of shadow administration risks can be exploited in one single step, and 13% of shadow admin still have domain administration privileges. Why, Illusive might ask its clients, does a general employee who, years ago, set up the company website, still have enough privileged access to take down the domain entirely?  

While yes, Nursall said, it is important to scan for risks and vulnerabilities of the network itself, it is just as important (perhaps even more so) to recognise those identity risks in the organisation. Without protecting against identity risks, a vulnerability management program is overall ineffective. This is because all organisations have identity risks, and all organisations must continually focus on discovering and remediating them. And it doesn’t just stop there: Illusive helps its clients create a management program for keeping identity risk away, permanently.  

 

 

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

A Research of Threat Actor Activity & Myths Busted by Cato Networks

Next Post

Microsoft Issue Updated Warning Against Known Cloud Threat Actor Group

Recent News

Ferrari Data Breach: The Industry has its say

Ferrari Data Breach: The Industry has its say

March 22, 2023
security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023
Organisational Cybersecurity.jpg

How Emerging Trends in Virtual Reality Impact Cybersecurity

March 21, 2023
Nominations are Open for 2023’s European Cybersecurity Blogger Awards

Nominations are Open for 2023’s European Cybersecurity Blogger Awards

March 20, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information