A single incident investigation creates bottlenecks of work.
Enterprises spend 11 person hours investigating and remediating a single critical identity-related security alert on average.
According to new research from Enterprise Strategy Group, the response time bottlenecks the capacity of security teams to manage alert volume.
Ev Kontsevoy, CEO of Teleport, a sponsor of Enterprise Strategy Group’s research, said: “When it only takes minutes for threat actors to move laterally across your infrastructure, 11 hours to investigate an identity-related incident simply isn’t good enough.”
Also the introduction of AI adds a new type of identity, but in many organisations, its rapid innovation is outpacing organisational oversight and creating new attack vectors. The study found that 44% of businesses have already deployed AI, which risks creating yet another identity silo involving potentially over-privileged access to sensitive data and resources across infrastructure.
“As we move deeper into the age of AI, we must remember that AI dramatically lowers the cost of identity attacks, and we must expect the frequency of them to increase,” Kontsevoy said. “We must improve the trustworthiness of computing environments. We can only achieve this by eliminating anonymity and human error, and by unifying identity to simplify policy enforcement and enhance visibility of what each identity is doing.”
Written by
Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.