Close Menu
  • Homepage
  • Local News
  • India
  • World
  • Politics
  • Sports
  • Finance
  • Entertainment
  • Business
  • Technology
  • Health
  • Lifestyle
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
Facebook X (Twitter) Instagram Pinterest
JHB NewsJHB News
  • Local
  • India
  • World
  • Politics
  • Sports
  • Finance
  • Entertainment
Let’s Fight Corruption
JHB NewsJHB News
Home»Technology»Why identity-first security is the first defense against sophisticated AI-powered social engineering
Technology

Why identity-first security is the first defense against sophisticated AI-powered social engineering

October 7, 2025No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Why identity-first security is the first defense against sophisticated AI-powered social engineering
Share
Facebook Twitter LinkedIn Pinterest Email

Offered by Cisco


Enterprise safety is having an id disaster. Attackers aren’t going after zero-day exploits on a server or an working system; as a substitute, the overwhelming majority of safety breaches are taking place in a surprisingly low-tech wave of id compromise through social engineering.

“Con males, and social engineering, have been round for a very long time,” says Matt Caulfied, VP of product, id at Cisco. “The oldest trick within the e-book is sneaking in by placing on a building vest and strolling within the entrance door, and that is basically the identical factor. You trick somebody into providing you with entry to their account, and use it to get all of the entry that they’ve, so far as you possibly can go.”

Contemplate spearphishing which as soon as meant laboriously researching a number of high-value targets. With AI, attackers can generate goal lists, determine these targets’ nearest kin, and fireplace off convincing emails and texts at scale — multiplying their odds, even for non-native audio system with out robust language expertise.

Nonetheless, there is a clear disconnect between consciousness and execution within the enterprise. Cisco Duo’s 2025 State of Identification Safety report discovered that 51% of organizations have suffered monetary losses from identity-related breaches. So why do 74% of IT leaders admit that id safety is an infrastructure-planning afterthought?

“It’s a essentially exhausting drawback to unravel,” Caulfield says. “Identification safety is exclusive in that it combines social features, and a psychological side, with a technical side. Over time, simply as their targets get higher at defending themselves, attackers get higher at attacking their targets. And whereas we all know stop id breaches completely, most of these mechanisms have been extremely costly and tough to scale, from an operational perspective.”

However robust id and entry administration (IAM) is now not non-obligatory — it should truly be the inspiration of enterprise safety, fairly than only one pillar, particularly as AI brokers acquire a foothold in organizations as a 3rd class of customers, with none of the restraints or guardrails that people presumably have.

A brand new definition of zero belief

In the present day you possibly can’t belief customers simply because they’re on the community, or coming from a company gadget; you possibly can solely set up belief by robust cryptographic id authentication. That shifts belief from the community over to id programs that authenticate the person. And since a zero-trust system is simply going to implement what the id system tells it to, id must be the inspiration of an enterprise safety course of — retaining programs secure, people from being hijacked, and AI brokers performing solely the actions they’re meant to take.

If that authentication and authorization step is improper, then it doesn’t matter how good your community entry management is. Nonetheless, conventional second-factor and multi-factor authentication is now not sufficient, since an SMS message, call-back quantity or perhaps a verified push notification can all be hacked.

“Just one in three leaders belief their present id suppliers to cease identity-based assaults. Simply since you’re doing id doesn’t imply you’re doing id securely,” Caulfield explains. ” Phishing-resistant authentication is the brand new gold commonplace, the place a person can’t be tricked into freely giving the keys to the dominion. They would wish to actually be at your desk with you, when you’re utilizing your laptop computer, in an effort to take over your account.”

Nonetheless, till now, phishing-resistant MFA approaches have both been too advanced or too costly to implement. Whereas 87% of leaders consider phishing-resistant MFA is crucial to a safety technique, solely 19% of firms have deployed FIDO2 tokens, that are an ordinary method to obtain phishing-resistant MFA. {Hardware} tokens are sometimes reserved for privileged customers, adoption typically stalls out right here as a consequence of token administration complexity (what occurs when a token is misplaced, for instance?), the expense and problems of coaching, and simply the price of creating and distributing a {hardware} answer.

Safety as an enabler

Consciousness of id safety is rising, Caulfield provides, with 82% of economic decision-makers rising budgets for id safety. However safety cannot be handled as an add-on, as a result of that ends in device sprawl, which provides further prices, complexity, and misalignment, together with decreased visibility total. To handle that head-on, 79% of leaders are exploring id vendor consolidation, which massively cuts down the operational drag of device proliferation.

Built-in instruments that provide interoperability in multi-cloud environments supply strategic simplification that not solely reduces prices and will increase safety, however improves organizational effectivity for IT and finish customers.

“Identification administration and safety is not only a essential evil, it is an enabler for a workforce and for purchasers interacting with a enterprise. It is as a lot a safety concern as it’s a productiveness and IT concern,” he says. “Phishing-resistant authentication is that simple button to get to the identity-first strategy to safety that makes it work.”

Find out how Duo and Cisco Identification Intelligence are serving to international groups make sense of the advanced id panorama: Obtain Cisco Duo’s report, The 2025 State of Identification Safety: Challenges and Methods from IT and Safety Leaders.


Sponsored articles are content material produced by an organization that’s both paying for the submit or has a enterprise relationship with VentureBeat, and so they’re all the time clearly marked. For extra info, contact gross sales@venturebeat.com.

Source link

AIpowered defense Engineering identityfirst security social Sophisticated
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

OpenAI is transforming ChatGPT for Android: New ‘Memory’ tools and a full-screen makeover leaked | Technology News

March 8, 2026

That ‘AI caricature using everything about me’ trend could expose you to digital fraud | Technology News

March 8, 2026

Which AI-Powered Adtech Stock Is the Better Buy?

March 7, 2026

Google Pixel 10 vs Pixel 10a: A closer look at design, display, and camera upgrades | Technology News

March 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Target (TGT) Reports Q4 Net Sales of $30.5B, Full-Year Adjusted EPS of $7.57

March 8, 2026

Gavin Newsom Says Stephen Miller, Not Kristi Noem, Is ‘The Dark Heart Of This Administration’

March 8, 2026

Princess Eugenie Plotting Career Move To Join Team Sussex

March 8, 2026

OpenAI is transforming ChatGPT for Android: New ‘Memory’ tools and a full-screen makeover leaked | Technology News

March 8, 2026
Popular Post

Dow Jones Futures Erase Gains On Hot Inflation Data; Fed Minutes Next; PepsiCo Jumps

IND vs PAK T20 World Cup 2022 Match 16

Equine-facilitated therapy found to improve the functioning of patients with low back pain

Subscribe to Updates

Get the latest news from JHB News about Bangalore, Worlds, Entertainment and more.

JHB News
Facebook X (Twitter) Instagram Pinterest
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
© 2026 Jhb.news - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.