Intelligent CISO Issue 38 | Page 28

Organisations need to go beyond traditional verification methods to provide additional layers of security in their IT environment . on and privileged access management solutions providing a positive user experience while mitigating the threat to data security . With only one set of credentials to remember , implementation of Multi-Factor Authentication , Two Factor Authentication ( 2FA ) or simply more stringent password specifications to strengthen the access credentials is far simpler .
Security leaders should be using World Password Day this year to think beyond passwords , instead looking at new verification layers , authentication methods and automation capabilities .
editor ’ s question

?

he recent targeted

T supply chain attack on the Passwordstate password manager shows that while strong password management and protection is important , organisations need to go beyond traditional verification methods to provide additional layers of security in their IT environment .

There is no question that Identity and Access Management ( IAM ) should be a cornerstone of security in any IT environment , providing centralised security controls and risk mitigation to protect information systems and data from access by unauthorised users and malicious actors . These tools simplify and strengthen system defences , with enterprise single sign

Organisations need to go beyond traditional verification methods to provide additional layers of security in their IT environment . on and privileged access management solutions providing a positive user experience while mitigating the threat to data security . With only one set of credentials to remember , implementation of Multi-Factor Authentication , Two Factor Authentication ( 2FA ) or simply more stringent password specifications to strengthen the access credentials is far simpler .

However , IAM solutions have experienced significant innovation in recent years , with Machine Learning , biometrics and automation providing far more substantial guarantees that a user really is who they claim to be . Security leaders should be using
IAN JENNINGS , MANAGING DIRECTOR AT BLUEFORT SECURITY

Security leaders should be using World Password Day this year to think beyond passwords , instead looking at new verification layers , authentication methods and automation capabilities .

World Password Day this year to think beyond passwords , instead looking at new verification layers , authentication methods and automation capabilities that provide much greater prevention against attackers compromising valuable credentials . To support this shift in thinking , organisations should look to expert partners to help identify the correct combination of these innovative technologies and services that will best protect their individual information systems and information assets .
28 www . intelligentciso . com