Site icon LIFARS, a SecurityScorecard company

Only 54% of Cybersecurity Pros Set Rules for Key Creation

Cybersecurity Professional Set Rules for Key Creation

Cybersecurity Professional Set Rules for Key Creation

When you arrive at the office in the morning, you have to input your usernames and passwords in order to identify yourself and turn on your computers. Machines need to do the same thing in order to start their regular work. Secure authentication of machine identities most likely depends on the cryptographic keys and digital certificates. Rules for key creation reflect the gap between the implementation of security controls for human identities or machine identities. Therefore, the keys set for machine identities are very important and it should be set wisely.

In research conducted recently, more than 1,500 cybersecurity professionals representing their companies and industries in the U.S., U.K., France, Germany, and Australia are interviewed. Among these cybersecurity pros:

Fortunately, we can tell the organizations will improve their machine identity protection soon as they have already planned on spending more $10 billion on improving human identities this year. Improving machine identity protection as the next step is very important because machines in enterprises, including virtual machines, applications, algorithms, APIs and containers, are exponentially growing.

 

Are You Concerned About Ransomware or Malware?
There are preventive measures your organization can take to defend against an cyber attack.
LIFARS offering Free 30-minute consultation on cyber resiliency.
Email:contact@lifars.com | Call us at:(212) 222-7061

 

Credits:
helpnetsecurity.com/2019/12/27/keys-for-machine-identities/

Exit mobile version