Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Top security predictions for the enterprise in 2022

January 2022 by Andre Durand, founder, and CEO of Ping Identity

1. Cybersecurity becomes ESG Issue
As our lives become more digital, and digital and physical controls collide, investing in security to keep society safe will become recognized as the 4th responsibility of ESG (environment, social, and governance) for corporations. Data breaches have more than just technological implications, as the disruptions affect society, making cybersecurity a key metric in the social pillar.

2. MFA to become a Global Mandate
In the ongoing war against the global threat landscape, multi-factor authentication (MFA) will become mandated everywhere to secure logins, not just in the US, but across the world.

3. Bad Bot Tsunami
Bots are over-running customer-facing systems, and we will need to leverage AI and machine learning to both detect and protect against bots impersonating humans when creating or attempting to take over accounts.

4. Focus Shifts to Authorization
Driven by zero trust, a decade of focus on authentication begins to shift towards authorization. Identity doesn’t stop with ensuring you’re talking to the right person, it’s all about authorizing appropriate access.

5. Rise of Digital Wallets
Users will begin to store verified data about themselves on their phone, such as their real identity via government-issued IDs in digital wallets as those provided by Apple and Google. But it won’t stop at real IDs and will extend into all sorts of other identity data being shared with the user for better privacy and control by the individual.

6. Attacks on zombie and shadow APIs
It’s projected that over 90% of attacks will focus on APIs in 2022. For those companies without well-formed API governance, controls, and security practices, APIs will become the weak link.

7. Convergence of IT and OT
Information Technology and Operational (physical) Technology collide, and IT teams take over responsibility for the security of OT. This will lead to a need for interoperability between IT/OT initially, and ultimately a convergence of redundant technology to control who can physically get in the building and who can access apps.

8. Rise of the CISO
Corporate boards care about cyber risk, so identity leaders will report directly to the CISO, and the CISO will report to the board. Gartner predicts that 40% of boards will have a dedicated cybersecurity committee by 2025.

9. Identity Focus Shifts to Experience
The focus will shift from the deployment model (e.g., cloud) as the enabler of speed to no-code, low-code orchestration as the enable of both speed and agility of extraordinary end-user experiences.


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts