venturebeat.com Open in urlscan Pro
192.0.66.2  Public Scan

URL: https://venturebeat.com/security/report-89-of-organizations-have-been-hit-by-an-identity-based-attack-in-the-past-year/
Submission: On May 08 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://venturebeat.com/

<form method="get" action="https://venturebeat.com/" class="search-form" id="nav-search-form">
  <input id="mobile-search-input" class="" type="text" placeholder="Search" name="s" aria-label="Search" required="">
  <button type="submit" class="">
    <svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
      <g>
        <path fill-rule="evenodd" clip-rule="evenodd"
          d="M14.965 14.255H15.755L20.745 19.255L19.255 20.745L14.255 15.755V14.965L13.985 14.685C12.845 15.665 11.365 16.255 9.755 16.255C6.16504 16.255 3.255 13.345 3.255 9.755C3.255 6.16501 6.16504 3.255 9.755 3.255C13.345 3.255 16.255 6.16501 16.255 9.755C16.255 11.365 15.665 12.845 14.6851 13.985L14.965 14.255ZM5.255 9.755C5.255 12.245 7.26501 14.255 9.755 14.255C12.245 14.255 14.255 12.245 14.255 9.755C14.255 7.26501 12.245 5.255 9.755 5.255C7.26501 5.255 5.255 7.26501 5.255 9.755Z">
        </path>
      </g>
    </svg>
  </button>
</form>

Text Content

WE VALUE YOUR PRIVACY

We and our partners store and/or access information on a device, such as cookies
and process personal data, such as unique identifiers and standard information
sent by a device for personalised ads and content, ad and content measurement,
and audience insights, as well as to develop and improve products. With your
permission we and our partners may use precise geolocation data and
identification through device scanning. You may click to consent to our and our
partners’ processing as described above. Alternatively you may click to refuse
to consent or access more detailed information and change your preferences
before consenting. Please note that some processing of your personal data may
not require your consent, but you have a right to object to such processing.
Your preferences will apply to this website only. You can change your
preferences at any time by returning to this site or visit our privacy policy.
MORE OPTIONSDISAGREEAGREE

Skip to main content
Events Video Special Issues
VentureBeat Homepage

Subscribe

 * Artificial Intelligence
   * View All
   * AI, ML and Deep Learning
   * Auto ML
   * Data Labelling
   * Synthetic Data
   * Conversational AI
   * NLP
   * Text-to-Speech
 * Security
   * View All
   * Data Security and Privacy
   * Network Security and Privacy
   * Software Security
   * Computer Hardware Security
   * Cloud and Data Storage Security
 * Data Infrastructure
   * View All
   * Data Science
   * Data Management
   * Data Storage and Cloud
   * Big Data and Analytics
   * Data Networks
 * Automation
   * View All
   * Industrial Automation
   * Business Process Automation
   * Development Automation
   * Robotic Process Automation
   * Test Automation
 * Enterprise Analytics
   * View All
   * Business Intelligence
   * Disaster Recovery Business Continuity
   * Statistical Analysis
   * Predictive Analysis
 * More
   * Data Decision Makers
   * Virtual Communication
     * Team Collaboration
     * UCaaS
     * Virtual Reality Collaboration
     * Virtual Employee Experience
   * Programming & Development
     * Product Development
     * Application Development
     * Test Management
     * Development Languages


Subscribe Events Video Special Issues



REPORT: 89% OF ORGANIZATIONS HAVE BEEN HIT BY AN IDENTITY-BASED ATTACK IN THE
PAST YEAR

VB Staff
December 15, 2022 7:10 AM
 * Share on Facebook
 * Share on Twitter
 * Share on LinkedIn

Image Credit: Shutterstock

Join top executives in San Francisco on July 11-12, to hear how leaders are
integrating and optimizing AI investments for success. Learn More

--------------------------------------------------------------------------------



Identity-based attacks this year have hit every industry and top enterprises,
and there’s no sign of a slowdown. A new report from One Identity – based on a
survey of over 1,000 IT security professionals – confirms this, revealing 89% of
organizations have been hit by an identity-based attack in the past year.

This proliferation of identity-based attacks is causing organizations to take a
closer look at their defenses, as 80% believe that better identity management
tools could have lessened the impact of many such attacks. Since the inception
of identity management tools, companies have been forced to deploy numerous
solutions to manage each area of access.

1
/
6
Internal threats that create external attack opportunities and how to combat
them
Read More

428K
29




Video Player is loading.
Play Video
Unmute

Duration 0:00
/
Current Time 0:00
Playback Speed Settings
1x
Loaded: 0%

0:00

Remaining Time -0:00
 
FullscreenPlayUp Next

This is a modal window.



Beginning of dialog window. Escape will cancel and close the window.

TextColorWhiteBlackRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentBackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentTransparentWindowColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyTransparentSemi-TransparentOpaque
Font Size50%75%100%125%150%175%200%300%400%Text Edge
StyleNoneRaisedDepressedUniformDropshadowFont FamilyProportional
Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall
Caps
Reset restore all settings to the default valuesDone
Close Modal Dialog

End of dialog window.

Share
Playback Speed

0.25x
0.5x
1x Normal
1.5x
2x
Replay the list

TOP ARTICLES






 * Powered by AnyClip
 * Privacy Policy




Internal threats that create external attack opportunities and how to combat
them
Internal threats that create external attack opportunities and how to combat
them
NOW PLAYING
UP NEXT
Investing in technologies and people to defend financial institutions
NOW PLAYING
UP NEXT
Rebuilding cybersecurity threat detection and response
NOW PLAYING
UP NEXT
Becoming Secure by Design
NOW PLAYING
UP NEXT
Optimizing security strategies during an acute talent shortage
NOW PLAYING
UP NEXT
Identifying and mitigating the most critical security risks
NOW PLAYING
UP NEXT


Image source: One Identity.

Unfortunately, over the last 60 years of identity management, this process
hasn’t changed – and companies are still using multiple tools that are operating
in silos. Today, 96% of businesses are using multiple identity tools with 46%
deploying at least 25 different systems.

However, more doesn’t always mean better protection; in fact, 70% of
organizations are spending money on tools they’re not even using. What’s worse
is that the inefficiencies caused by using these multiple tools cost 42% of
companies over $100,000 per year.


EVENT

Transform 2023

Join us in San Francisco on July 11-12, where top executives will share how they
have integrated and optimized AI investments for success and avoided common
pitfalls.

 


Register Now
advertisement


Due to these incurred costs, more than half (51%) of companies are planning to
consolidate their identity security tools over the next year. 48% believe
consolidation will eliminate the time-consuming and expense of managing multiple
identity solutions, while 37% believe it will make it easier to adapt to the
changing threat landscape.

Looking ahead to 2023, as the number of digital identities that businesses
manage continues to multiply – with 52% already managing over 10,000 identities
– enterprises will need to shift their security approach. More than half believe
that having a unified identity platform would greatly benefit their identity
management strategy.

Through this approach, companies can eliminate the lack of interoperability
between solutions to not only cut costs, but better protect against the barrage
of cyberattacks hitting their business.

Read the full report from One Identity.

VentureBeat's mission is to be a digital town square for technical
decision-makers to gain knowledge about transformative enterprise technology and
transact. Discover our Briefings.


Most Read
1 A CISO’s perspective on a TikTok ban and what it means for enterprises 
2 It’s 2023: Do you know if your Kubernetes environments are safe?
3 Decentralized identity: The key to the digital era? (Sponsored)


SIGN UP FOR VB DAILY

Want must read news straight to your inbox?

Subscribe


 * VentureBeat Homepage
 * Follow us on Facebook
 * Follow us on Twitter
 * Follow us on LinkedIn
 * Follow us on RSS

 * Press Releases
 * Contact Us
 * Advertise
 * Share a News Tip
 * Contribute to DataDecisionMakers

 * Careers
 * Privacy Policy
 * Terms of Service
 * Do Not Sell My Personal Information

© 2023 VentureBeat. All rights reserved.