• Latest
  • Trending
Defending Hybrid Identity Environments Against Cyberattacks

Defending Hybrid Identity Environments Against Cyberattacks

March 1, 2022
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
Fibre optic interconnection linking Cameroon and Congo now operational

Fibre optic interconnection linking Cameroon and Congo now operational

July 15, 2022
Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

July 15, 2022
Airtel Africa Purchases $42M Worth of Additional Spectrum

Airtel Africa Purchases $42M Worth of Additional Spectrum

July 15, 2022
Huawei steps up drive for Kenyan talent

Huawei steps up drive for Kenyan talent

July 15, 2022
TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

July 15, 2022
Facebook to allow up to five profiles tied to one account

Facebook to allow up to five profiles tied to one account

July 15, 2022
Top 10 apps built and managed in Ghana

Top 10 apps built and managed in Ghana

July 15, 2022
MTN Group to Host the 2nd Edition of the MoMo API Hackathon

MTN Group to Host the 2nd Edition of the MoMo API Hackathon

July 15, 2022
KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

July 15, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Sunday, 5 February, 2023
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Defending Hybrid Identity Environments Against Cyberattacks

by ITECHNEWS
March 1, 2022
in Leading Stories, Opinion
0 0
0
Defending Hybrid Identity Environments Against Cyberattacks

As the world continues to embrace digital transformation and distributed work, businesses will continue to deploy SaaS apps—while continuing to use on-premises tools. Hybrid ecosystems are becoming increasingly common as a result. Unfortunately, current identity and access management (IAM) practices simply aren’t up to the task of managing them.

The average business operates at least 20 products that manage and maintain identity. Access control for these products can be a mess, with credentials typically spread across the entire organization. It’s a veritable treasure trove for malicious hackers.

YOU MAY ALSO LIKE

Inaugural AfCFTA Conference on Women and Youth in Trade

Instagram fined €405m over children’s data privacy

What can be done, then? At the recent Hybrid Identity Protection Conference, I moderated an industry panel discussion that started with precisely that question. We discussed the problems with current identity management practices and how businesses can update their practices to be more efficient, effective, and secure.

In this post, you’ll find key takeaways from the discussion, which included Ricky Allen, Critical Start CISO; Brian Desmond, Principal at Ravenswood Technology Group; Brandon Nolan, Global Digital Identity & Recovery lead at Avanade; and me, Founder and CEO of TAG Cyber.

1. Identities and endpoints can no longer be managed separately

The first step businesses must take is to reconceptualize how they approach IAM.

“You need to look at both endpoint and identity security at the same time,” said Desmond. “There’s no longer a difference between them. The days of devices and identity management being run by different departments are over—it simply doesn’t fly anymore, especially when you consider the established guidance around a zero-trust model.”

IAM is not something a product can simply provide. Instead, businesses must start with either identity or endpoint management, and then blend that element with its counterpart. As part of this process, it’s crucial to establish ownership of assets such as secrets and key vaults, define privileged vs. nonprivileged identities, and determine concrete access levels.

In a Microsoft environment, businesses can best achieve this balance by switching to Azure Active Directory (Azure AD) because it enables critical functionality, such as multifactor authentication (MFA).

2. Consolidation is the first step in solving the hybrid security challenge

Complexity is the most significant roadblock to effective hybrid security. As many businesses have discovered, an integrated approach is key to addressing this obstacle. Organizations can work with an identity services vendor to decommission existing endpoint solutions gradually and consolidate their functionality in a single platform. Said identity provider can then connect to Azure, enhancing efficiency while simultaneously reducing sprawl.

“Threat actors love your complexity,” said Nolan. “As a result, we’re seeing a lot of organizations explore how to get away from that complexity. We’re starting to see a lot more movement toward the platform play instead of endpoint solutions.”

3. Real-time visibility is necessary

A business without a clear picture of its assets is a prime target for exploitation. Unfortunately, cloud-focused business environments move too quickly for traditional auditing techniques. Snapshots are similarly unsuitable, offering a static picture of a dynamic environment.

“Inventory is a moving target,” Desmond said. “By the time you finish an audit, the information you have is already out of date.”

Businesses can address this issue by adopting automated detection tools. Tools based on artificial intelligence and machine learning can actively monitor infrastructure and categorize alerts for human security teams to address. In this way, a business can engage in real-time management, threat detection, and remediation.

“Visibility tends to be highly complex,” said Nolan. “In our case, we parse an ecosystem into an identity, endpoint, network, and automation layer, respectively. The idea is that visibility is about more than assets or inventory: It’s as much about authentication telemetry and federation services.”

4. Legacy culture is a significant stopping point

For businesses to embrace hybrid IAM, they must first shed their old habits, ideas, and beliefs about authentication and access control. Legacy systems are a symptom of this old way of thinking. They are simultaneously the greatest security threat facing many businesses and the anchor holding those businesses down during digital transformation.

“I think the whole topic of this conversation here is establishing the biggest risk,” said Allen. “And I find that it’s legacy equipment. We’ve always taken a reverse, backwards-compatible approach, even as we move forward faster and faster. We don’t bring the lowest common denominator with us. We basically have to downgrade all our authentication as a result.”

Moving away from this paradigm and shedding habits built up over more than 20 years is no simple task. It requires significant collaboration between IT and other business segments. It also demands that businesses accept the ethos of less is more—the fewer distinct systems an organization relies on, the better.

What the future holds

Microsoft has long played a prominent role in enterprise security. Where hybrid IAM is concerned, however, Azure AD has the potential to play an even more pivotal role. For any business that works within the Microsoft stack, E5 licenses are particularly important, providing better access control, visibility, and threat detection.

“I think that ultimately, the focus should be on what Microsoft is doing in the security environment,” concluded Allen. “The company’s approach to its products has changed, converging into a single product SKU that now manages email to endpoint to identity across the board. It’s definitely worth consideration and worth looking into E5 licensing.”

Meanwhile, new technologies such as blockchain could redefine how we manage encryption. By storing a key vault in a distributed ledger, one can not only secure that vault but also ensure that it retains its integrity. That said, this technology is still highly theoretical, and we’re unlikely to see much before 2023.

For hybrid security, partnerships are the path forward

Securing a hybrid environment is a complex, resource-intensive task, one that requires a business to rethink not only its infrastructure but its entire culture. The ongoing talent shortage represents perhaps the greatest impediment to transformation. Ultimately, hybrid identity means that it will not merely be advisable to partner with other organizations, it will become necessary.

Source: Edward Amoroso
Via: Security Boulevard
Tags: Hybrid Identity Environments
ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022

Recent News

  • Inaugural AfCFTA Conference on Women and Youth in Trade September 6, 2022
  • Instagram fined €405m over children’s data privacy September 6, 2022
  • 5.7bn data entries found exposed on Chinese VPN August 18, 2022
  • Fibre optic interconnection linking Cameroon and Congo now operational July 15, 2022
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version