In the journey of transformation to cloud adoption, mobile, Internet of Things (IoT) and more, all CISOs are under tremendous pressure to avoid having that transformation impacted by security incidents. Security is impossible without embracing a proper culture in terms of awareness of risks and good practices, either in terms of utilization of IT services, administration of IT services or development of IT services. But are we sure it is about just culture? Let me provide a few examples.

Culture and Technology Work Together

Password cracks are still one of the most important issues in enterprises today, and best practices suggest that passwords should not be written down and should have specific standards (e.g., a mix of uppercase and lowercase letters, numbers, etc). Of course this is feasible when we have just a single password to remember, but what happens when we have tons of passwords? How is it possible to remember dozens of complex passwords without a support system?

So while security culture is needed to ensure people have strong passwords, that culture needs to be supported by proper technology. In this case, that technology is the single sign-on, which allows a user to authenticate to multiple applications that require passwords with one authentication session.

Multiple Identities Create Problems

The same discussion can be applied for the management of identities. Best practice dictates that each identity must be validated and that individual access passwords should be changed in a timely manner.

While this may be feasible for a single application, it becomes impossible for many applications with many users. An identity management solution can help in this instance, alleviating the stress of users and administrators while ensuring that all activity done on a corporate network is protected.

I would add the federated identity management and identity governance to the list of must-haves for an enterprise. It is possible to navigate an application requiring many different authentications, but it is tedious to insert the user ID and password several times. This make the service too cumbersome in the eyes of many employees.

We often talk about the security culture of an organization, but the reality is that the technology — in this example, federated identity management — is missing. That technology provides the potential to navigate the transactions without the need to authenticate all the time (or at least as few times as possible).

Identity governance is a bit different. Enterprises have many user IDs, and single sign-on can facilitate password management for those accounts, but do we really need all those user IDs? Could we have fewer user IDs with only the access we need for the type of activity being performed?

Moving Forward With Security

At the very least, companies need to manage critical access by recording all the activities performed during the session for future auditing. This is a matter of culture, but technology has a role, as well. Without making proper technology decisions, it would be difficult to connect security culture, awareness and security incidents. For an organization to have a good overall security posture, its culture and technological systems must work together to support employees and corporate initiatives.

More from Identity & Access

Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space

View Part 1, Introduction to New Space, and Part 2, Cybersecurity Threats in New Space, in this series. As we see in the previous article of this series discussing the cybersecurity threats in the New Space, space technology is advancing at an unprecedented rate — with new technologies being launched into orbit at an increasingly rapid pace. The need to ensure the security and safety of these technologies has never been more pressing. So, let’s discover a range of measures…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

Kronos Malware Reemerges with Increased Functionality

The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

An IBM Hacker Breaks Down High-Profile Attacks

On September 19, 2022, an 18-year-old cyberattacker known as "teapotuberhacker" (aka TeaPot) allegedly breached the Slack messages of game developer Rockstar Games. Using this access, they pilfered over 90 videos of the upcoming Grand Theft Auto VI game. They then posted those videos on the fan website GTAForums.com. Gamers got an unsanctioned sneak peek of game footage, characters, plot points and other critical details. It was a game developer's worst nightmare. In addition, the malicious actor claimed responsibility for a…