checkAd

     129  0 Kommentare New “CISO View” Survey on Zero Trust Highlights Credential Theft Trends for New Types of Identities

    A new survey released by CyberArk (NASDAQ: CYBR), the global leader in Identity Security, found that 97 percent of senior security executives say attackers are increasingly trying to steal one or more types of credentials. As organizations move assets to the cloud, increase third-party access to corporate resources, and enable sustained remote work models, attackers are targeting non-traditional user populations that may not be adequately protected.

    This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20210325005140/en/

    CyberArk CISO View report finds organizations embracing Zero Trust security models. (Photo: Business Wire)

    CyberArk CISO View report finds organizations embracing Zero Trust security models. (Photo: Business Wire)

    Sponsored by CyberArk, “The CISO View 2021 Survey: Zero Trust and Privileged Access,” demonstrates consensus around the value of Zero Trust and a growing sense of urgency for securing privileged access.

    The survey revealed a marked shift in spear-phishing and impersonation attack patterns:

    • The most widely reported group facing increased attacks is end-users – including business users with access to sensitive data. A majority of respondents (56 percent) report such users as being increasingly targeted by attackers.
    • Attacks are also on the rise against senior leadership (48 percent), third-party vendors and contractors (39 percent), and DevOps and cloud engineers (33 percent).
    • Widespread increases in credential theft attempts were reported for personal data (70 percent) and financial systems and data (66 percent). This is clear evidence of attackers’ interest in gaining “high-value” access – access to highly sensitive systems that are often held by end-users rather than administrators for example.

    In response to these shifting attack patterns, security leaders are embracing Zero Trust models:

    • Eighty-eight (88) percent of respondents said adopting more of a Zero Trust approach is “very important” or “important.”
    • To implement a Zero Trust model, the top priority was controls focusing on Identity and Access Management (IAM), chosen by 45 percent of respondents.
    • Several types of IAM controls were favored to protect access to sensitive systems. Just-in-time access controls were highly valued, with 87 percent of respondents saying reducing standing privileges is an “important” or “very important” aspect of Zero Trust.

    Because attackers recognize the value of non-IT identities and are exploiting weaknesses in protecting these identities because of operational challenges, there is a need for security solutions that work despite internal constraints:

    Seite 1 von 3



    Business Wire (engl.)
    0 Follower
    Autor folgen

    Weitere Artikel des Autors


    New “CISO View” Survey on Zero Trust Highlights Credential Theft Trends for New Types of Identities A new survey released by CyberArk (NASDAQ: CYBR), the global leader in Identity Security, found that 97 percent of senior security executives say attackers are increasingly trying to steal one or more types of credentials. As organizations move …

    Schreibe Deinen Kommentar

    Disclaimer