FB pixel

Close systemic IAM gaps to keep stolen credentials from slipping through: BeyondID

Report says stolen credentials linked to insiders remain top threat to enterprises
Categories Access Control  |  Biometrics News
Close systemic IAM gaps to keep stolen credentials from slipping through: BeyondID
 

Stolen credentials are the initial vector of attack not just for the most incidents, but the longest-lasting ones as well, according to a new report from BeyondID. Attacks carried out with stolen enterprise IDs or other credentials last an average of ten months before they are detected, the company found.

BeyondID sats that up to 60 percent of stolen credentials were exposed, intentionally or otherwise, by internal actors like employees.

The problem affects 9 in 10 companies, according to the KeyData Cyber subsidiary’s report on “The Identity Economy: How Gaps in Identity Management Enable and Sustain Cybercrime.”

Common security practices create systemic weaknesses in identity and access management (IAM), which are targeted by attackers. The advent of AI tools for phishing and data harvesting only exacerbates the threat.

AI attacks are expected to grow in number, with impersonation of authorized users anticipated as the most significant challenge over the next 12 to 18 months, according to 37 percent. Coordinated multi-vector attacks and social engineering with deepfakes are seen as the top threat in that span by 19 percent and 15 percent, respectively.

The report explains the problem, and offers steps to address it.

To limit their exposure, organizations should maintain vigilance to identify security gaps throughout system lifecycles, incorporate multiple digital identity security solutions designed to work together, integrate tools with proactive management and focus on real-time, continuous compliance with regulations and best practices, BeyondID advises.

The point is similar to that made by Ping Identity VP of Product Management Jason Oeltjen about fraud and identity teams collaboration with each other to apply stolen credential monitoring to identity workflows in an August Biometric Update guest post.

“One of the biggest mistake companies can make when working to improve business identity theft protection and remediate identity exploit vectors is to believe the work is a one-time effort and thus adopt a static approach to a dynamic problem,” the report says.

The report presents the concept of “Identity Exploit Vectors” or “IEVs,” and describes the most common types.

“Identity has become the new perimeter, yet many organizations still underestimate its role in sustaining the global cybercrime economy. Cybercrime once relied on brute force or network flaws, but now depends on identity,” says BeyondID CEO Arun Shrestha. “The stakes have never been higher; yet identity remains one of the most overlooked areas of cybersecurity investment. This report is a wake-up call to prioritize identity as a front-line defense, not a backend concern.”

Shrestha will present the report’s findings, along with Biogen Head of Access Automation and Cybersecurity Laura Curtaccio at Okta’s Oktane 2025 on Thursday.

Related Posts

Article Topics

 |   |   |   | 

Latest Biometrics News

 

Face biometrics use cases outnumbered only by important considerations

With face biometrics now used regularly in many different sectors and areas of life, stakeholders are asking questions about a…

 

Biometric Update Podcast explores identification at scale using browser fingerprinting

“Browser fingerprinting is this idea that modern browsers are so complex.” So says Valentin Vasilyev, Chief Technology Officer of Fingerprint,…

 

Passkeys now pervasive but passwords persist in enterprise authentication

Passkeys are here; now about those passwords. Specifically, passkeys are now prevalent in the enterprise, the FIDO Alliance says, with…

 

Pornhub returns to UK, but only for iOS users who verify age with Apple

In the UK, “wanker” is not typically a term of endearment. However, the case may be different for Pornhub, which…

 

Europol operated ‘shadow’ IT systems without data safeguards: Report

Europol has operated secret data analysis platforms containing large amounts of personal information, such as identity documents, without the security…

 

EU pushes AI Act deadlines for high-risk systems, including biometrics

The EU has reached a provisional agreement on changes to the AI Act that postpone rules on high-risk AI systems,…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events