August 17, 2022 By Jennifer Gregory 2 min read

Over the past two years, businesses have focused on changing how they work. However, these pandemic changes required a high level of IT support and resources. This often causes deficits in other areas, such as the strength to stop a supply chain attack.

The CyberArk 2022 Identity Security Threat Landscape Report found that 79% of cybersecurity workers surveyed felt that cybersecurity took a backseat to operations and these new digital initiatives. The report surveyed 1,750 IT workers at companies with more than 500 employees located in the U.S., UK, France, Germany, Japan, Italy, Spain, Brazil, Mexico, Israel, Singapore and Australia. One in four of the respondents was a C suite executive and 94% work at a manager level or higher.

Cybersecurity debt putting businesses at risk

Udi Mokady, founder, chairman and CEO of CyberArk, says that digital transformation spending has skyrocketed.

“The combination of an expanding attack surface, rising numbers of identities and behind-the-curve investment in cybersecurity ⁠— what we call cybersecurity debt ⁠— is exposing organizations to even greater risk, which is already elevated by ransomware threats and vulnerabilities across the software supply chain,” Mokady said. “This threat environment requires a security-first approach to protecting identities, one capable of outpacing attacker innovation.”

Cybersecurity workers named hybrid working as the biggest risk factor in their jobs (86%). Bringing in new digital services for customers or citizens and increased outsourcing of remote vendors and suppliers tied for second with 84% of respondents. Each of these added new human and machine identities.

Can you stop a supply chain attack?

One of the biggest surprises: 64% of respondents could not stop an attack from a compromised software supplier. At the same time, 71% of organizations were victims of software supply chain attacks, resulting in data loss or asset compromise. The risk of such an attack is very high for businesses of all sizes. The energy and utility industry was at very high risk, with 88% of respondents reporting a successful attack.

The solution? You may want to require a bill of materials for all software deployments. This reduces the risk of malicious files being included in the download. This also increases visibility into open-source components of the software, which often are high-risk. Most of the respondents to the survey felt that a bill of materials would reduce the risk of software deployments.

Zero trust for a strong defense

One of the biggest takeaways of the report is that zero trust is the best path forward, with almost 100% of respondents at some point on the zero trust maturity curve. Many organizations started their zero trust approach with the principle of least privilege. Some 54% used this principle or plan to use it.

About half of the respondents reported they made an effort to add identity security tools, such as workload (52%), identity security (50%) and data security (45%). In addition, 28% use just-in-time access controls. These only allow access for the amount of time required to complete the task.

The report concludes that businesses and agencies should start by pinpointing high-risk areas in a ‘pay-off plan’. Then, they can create a timeline to remove any more cybersecurity debt. And that’s a timeline to a more secure future.

More from News

CISA launches portal to simplify cyber incident reporting

2 min read - Information sharing just got more efficient. In August, the Cybersecurity and Infrastructure Security Agency (CISA) launched the CISA Services Portal. “The new CISA Services Portal improves the reporting process and offers more features for our voluntary reporters. We ask organizations reporting an incident to provide information on the impacted entity, contact information, description of the incident, technical indications and steps taken,” a CISA spokesperson said in an email statement. “Reported incidents enable CISA and our partners to help victims mitigate…

FYSA – Critical RCE Flaw in GNU-Linux Systems

2 min read - Summary The first of a series of blog posts has been published detailing a vulnerability in the Common Unix Printing System (CUPS), which purportedly allows attackers to gain remote access to UNIX-based systems. The vulnerability, which affects various UNIX-based operating systems, can be exploited by sending a specially crafted HTTP request to the CUPS service. Threat Topography Threat Type: Remote code execution vulnerability in CUPS service Industries Impacted: UNIX-based systems across various industries, including but not limited to, finance, healthcare,…

Are new gen AI tools putting your business at additional risk?

3 min read - If you're wondering whether new generative artificial intelligence (gen AI) tools are putting your business at risk, the answer is: Probably. Even more so with the increased use of AI tools in the workplace. A recent Deloitte study found more than 60% of knowledge workers use AI tools at work. While the tools bring many benefits, especially improved productivity, experts agree they add more risk. According to the NSA Cybersecurity Director Dave Luber, AI brings unprecedented opportunities while also presenting…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today