INSUBCONTINENT EXCLUSIVE:
When the 2010s began, only 38 per cent of data breaches used stolen credentials; by 2017, this figure was 81 per cent
As the pace of digitization has increased, identity and access assurance has become a critical issue and the single most important control
companies including Google, Yahoo and Hotmail all ending up for sale on the Dark Web; identity has been at the heart of some of the major
Security.As we have become more reliant on digital interactions that rely on identities, new and unprecedented security challenges have been
We need to be able to trust the device, the networks and the user; even though we can often no longer see who or what that is
Identity has become a crucial weakness that hackers are exploiting
sale and thousands and passwords used to maliciously attack companies, but the next decade will see an evolution of identity security, with
secure but user-friendly identity strategies on the horizon
expect the next ten years to transform the way identity impacts the corporate and hacker worlds in several key ways:1
the number one attack vector for malicious actors; the market for stolen corporate credentials has become a booming business for cyber
criminals over the past decade
Looking ahead, however, we can expect hackers to begin to shift their attacks from simply using stolen credentials that are available on the
dark web, to infiltrating password recovery mechanisms in order to harvest and then reset user credentials themselves
In other words, attackers will successfully take over user identities and re-establish them with new usernames and passwords, thereby
credentials, the stakes will become much higher and will require a new security approach focused on employee monitoring to prove a user is
on password management and usernames for account enrollment and recovery
across their organizations considering the dynamics at play
use a password day-to-day are almost certain to forget and disregard credentials at a higher rate, thereby requiring more support than they
Authentication will need a personal touchAs we move towards the passwordless world, organisations are today facing a plethora of choice when
it comes to their authentication strategies
With constant innovation and evolution in technology, there are now many more ways than ever users can verify who they say they are and
access resources; from push notifications, to behaviours, to one-time passwords, biometrics, hardware tokens and more
This can make it difficult for organisations to choose the appropriate authentication strategy
organisations with dynamic workforces
What we can expect to see is organisations making much more personalised decisions on authentication, so they can strike their own balance
between security and user experience.4
to interact with devices in new ways
will begin to transition from purely consumer devices to being leveraged in business and corporate settings
As these automation technologies aid us with more and more complex tasks, the need for these devices to understand who can command them and
who they are acting on the behalf of will become much more critical
other devices take orders from.Welcome to 2020!As the next decade brings new technology, opportunities and challenges, identity will take
front-and-centre priority in the cybersecurity conversation
With attackers developing smarter ways to compromise credentials and as automated devices become more widespread in our corporate worlds,
identity will become both a key battleground and an opportunity
The blurring lines between corporate and consumer technology means any identity strategy needs to be both secure and convenient
Success will be all about striking the right balance.