• Latest
  • Trending
  • All
  • BUSINESS
  • ENTERTAINMENT
  • POLITICAL
  • TECHNOLOGY
User-centric security should be core to cloud IAM practice

User-centric security should be core to cloud IAM practice

November 6, 2024
Indices: Already not extreme fear

Indices: Already not extreme fear

April 24, 2025
Eurozone: Tariff reversal is some relief, but no game changer – ABN AMRO

Eurozone: Tariff reversal is some relief, but no game changer – ABN AMRO

April 24, 2025
US: The US has already lost the trade war – ABN AMRO

US: The US has already lost the trade war – ABN AMRO

April 24, 2025
Predictive Analytics Promise the End of ‘Gut Feelings’ in Construction

Predictive Analytics Promise the End of ‘Gut Feelings’ in Construction

April 24, 2025
First Border Wall Contracts of Second Trump Term Awarded in Texas, San Diego

First Border Wall Contracts of Second Trump Term Awarded in Texas, San Diego

April 24, 2025
Construction Economics for April 28, 2025

Construction Economics for April 28, 2025

April 24, 2025
AI startups backed to boost construction productivity

AI startups backed to boost construction productivity

April 24, 2025
Why is building safety litigation on the rise?

Why is building safety litigation on the rise?

April 24, 2025
Severfield to cut 6 per cent of staff despite ‘solid’ order book

Severfield to cut 6 per cent of staff despite ‘solid’ order book

April 24, 2025
Bovis promotes operations head to board

Bovis promotes operations head to board

April 24, 2025
China expresses condolences over death of Pope Francis, World News

China expresses condolences over death of Pope Francis, World News

April 24, 2025
Pope Francis’ body taken in procession to St Peter’s for lying in state, World News

Pope Francis’ body taken in procession to St Peter’s for lying in state, World News

April 24, 2025
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Friday, May 9, 2025
No Result
View All Result
  • HOME
  • BUSINESS
  • ENTERTAINMENT
  • POLITICAL
  • TECHNOLOGY
  • ABOUT US
  • Login
  • Register
  • HOME
  • BUSINESS
  • ENTERTAINMENT
  • POLITICAL
  • TECHNOLOGY
  • ABOUT US
No Result
View All Result
Huewire
No Result
View All Result
Home TECHNOLOGY

User-centric security should be core to cloud IAM practice

by huewire
November 6, 2024
in TECHNOLOGY
0
User-centric security should be core to cloud IAM practice
491
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter

The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware

Mike Gillespie

By

  • Mike Gillespie

Published: 05 Nov 2024

Cyber attacks, phishing, and ransomware incidents are predominantly user-facilitated threats; their success is reliant on a human interaction. Relying solely on the next generation of technology to solve this issue is misguided; we cannot address a human problem with technology alone.

Security must shift to a more people-centric approach, as it is ultimately the individuals who require access, whose identities must be managed, and who need to be authenticated and it’s the people who are currently enabling the failures, even when that is inadvertent. We must recognise that this is fundamentally a people challenge, not merely a technological one. By prioritising human factors in our security strategy, we can build a more effective and resilient posture towards cyber attacks, phishing and ransomware.

This challenge isn’t new; it may seem so because we’re framing it as IT-centric. In reality, identity and access management (IAM) has been a fundamental practice for centuries, rooted in the principles of least privilege and need to know. What we often overlook is the importance of understanding our underlying information assets and identifying who truly needs access to them. By facilitating that access in a seamless manner, we enhance user experience while maintaining security. If we restructured our information assets to be more logical, user-friendly, and aligned with business functions, we could significantly improve our ability to manage access effectively.

Training and awareness continue to be neglected and underfunded, while technology receives a bigger share of attention and budget. Numerous reports, surveys, and presentations from security industry leaders consistently emphasise that effective training is crucial for enhancing our resilience against attacks. It’s time to prioritise investment in training and awareness, recognising them as vital components of a robust security strategy.

Technologies play a supportive role in combating these attacks but they ultimately depend on individuals to make the right choices. To build an effective defence, we must empower well-trained, security-conscious personnel who are backed by the right technology. Instead of having IT impose access restrictions arbitrarily, let’s engage our teams in identifying their access needs. By prioritising collaboration and understanding, we can create a security framework that truly protects both our people and our organisation.

Additionally, we must recognise that overly restrictive security practices can drive individuals toward risky behaviours, especially when they struggle to perform their jobs effectively. Just as laws differ in their approach, security policies should not mirror a Napoleonic framework, where users are limited to only what they are explicitly permitted to do. Instead, we should embrace a model that empowers users to fulfil their roles while maintaining security. It’s essential for security teams to collaborate with employees to identify solutions that enable safe and effective job performance, fostering a culture of trust and responsibility.

Shifting away from rigid rules is essential for progress, but it’s understandable that security professionals may feel hesitant, as clear-cut rules can be a comfort for some. User-centric security should be the future for genuine resilience.

Read more on Identity and access management products


  • Robust cloud IAM should align to zero-trust principles


  • Mandatory MFA pays off for GitHub and OSS community

    AlexScroxton

    By: Alex Scroxton


  • Securing the edge: A new battleground in mobile network security

    IslaSibanda

    By: Isla Sibanda


  • Gartner: Three top trends in cyber security for 2024

Read More

Share196Tweet123
huewire

huewire

Recent Comments

No comments to show.

Recent Posts

  • Indices: Already not extreme fear
  • Eurozone: Tariff reversal is some relief, but no game changer – ABN AMRO
  • US: The US has already lost the trade war – ABN AMRO
  • Predictive Analytics Promise the End of ‘Gut Feelings’ in Construction
  • First Border Wall Contracts of Second Trump Term Awarded in Texas, San Diego
Huewire

Copyrights © 2024 Huewire.com.

Navigate Site

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Follow Us

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • HOME
  • BUSINESS
  • ENTERTAINMENT
  • POLITICAL
  • TECHNOLOGY
  • ABOUT US

Copyrights © 2024 Huewire.com.