The Good Tech Companies - Aembit Unveils 2024 Survey Report Highlighting Major Gaps In Securing Non-Human Identities
Episode Date: September 19, 2024This story was originally published on HackerNoon at: https://hackernoon.com/aembit-unveils-2024-survey-report-highlighting-major-gaps-in-securing-non-human-identities. ...The survey of IT and security professionals also shows that careless habits, such as storing long-term credentials directly in code, relying on spreadsheets for Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #aembit, #cybernewswire, #press-release, #aembit-announcement, #cyber-threats, #cybercrime, #good-company, and more. This story was written by: @cybernewswire. Learn more about this writer by checking @cybernewswire's about page, and for more stories, please visit hackernoon.com.
Transcript
Discussion (0)
This audio is presented by Hacker Noon, where anyone can learn anything about any technology.
AEMBIT unveils 2024 survey report highlighting major gaps in securing non-human identities
by Cyber Newswire. N. Silver Spring, Maryland, September 19, 2024, Cyber Newswire, AEMBIT,
the non-human identity and access management, IAM, company, today released its 2024 Non-Human Identity Security
Report, a definitive survey highlighting how organizations currently manage and protect
non-human identities, NHIs, such as applications, scripts, and service accounts. The report reveals
a stunning, widespread reliance on outdated methods and manual practices that fail to
provide adequate protection against the reality of increased NHI-focused breaches. As non-human identities, NHIs, rapidly proliferate in modern
IT environments, driven by the shift from monolithic to distributed architectures,
widespread cloud adoption, and increasing automation, the report reveals a chasm between
inhuman and user identity security practices, with most organizations
acknowledging their efforts to secure non-human identities are either lagging or struggling to
keep pace. The survey of IT and security professionals also shows that careless habits,
such as storing long-term credentials directly in code, relying on spreadsheets for manual input,
and sharing sensitive information via collaboration tools are still prevalent.
Additionally, many organizations face difficulty in securing NHIs in complex,
multi-cloud environments, with concerns about inconsistent access management and unclear ownership of security processes. Key findings of the survey include
IAM maturity gap. 88.5% of organizations admitted that their non-human IAM practices lag behind
or are on par with their user IAM efforts. Low confidence. Only 19.6% of respondents
expressed strong confidence in their non-human IAM practices. Insecure practices. 30.9% of
respondents store long-term credentials in code and 23.7% share secrets through copying and pasting,
such as via email or messaging apps. Outmoded methods. 38.9% of respondents still use less
secure methods like secrets managers for non-human workload to workload authentication.
Cloud complexity. 35.6% of organizations struggle to manage non-human identity security across hybrid
and multi-cloud environments. Blind spots. 23.5% of organizations are not sure of the
biggest threat to their non-human identities. Greater than. Organizations are starting to
recognize that non-human identities are more greater than than just background tools.
As businesses rapidly automate, NHIs play a greater-than-critical role in digital ecosystems
and often handle sensitive data, said greater-than-David Goldschlag, co-founder and CEO of
Embed. Greater-than. But, as our survey shows, NHI security remains very much a work in progress.
Greater-than while awareness is growing. Most organizations still have significant
greater-than shortfalls in how they secure these
identities and the vital connections greater-than between them. It's time to elevate non-human IAM
to the same level of greater-than importance as user IAM. Greater-than greater-than, the survey,
which included responses from 110 professionals, from developers to identity architects to CISOs,
also revealed a growing need for more holistic approaches to
managing non-human identities. As businesses expand across cloud environments, managing workload
identities has become increasingly complex, with many organizations struggling to keep up dueto
piecemeal or legacy approaches. Those interested can read the full survey by downloading it here.
About MB2MBID is the non-human identity and access management platform
that secures access between workloads across clouds, SaaS, and data centers. With MBIT's
identity control plane, DevSecOps can fully automate secretless, policy-based, and zero-trust
workload access with MFA-strength capabilities. For more information, users can visit https colon slash slash aembit.io slash and follow
aembit on LinkedIn. Contact CMO Aperva Dave Aembitinfo at aembit.io.
Tip This story was distributed as a release by CyberNewsWire under HackerNoon's business
blogging program. Learn more about the program here.
Thank you for listening to this HackerNoon story, read by Artificial Intelligence.
Visit HackerNoon.com to read, write, learn and publish.