Thursday, August 6, 16:50
Home security Research proves the lack of security of organizations!

Research proves the lack of security of organizations!

Over the years, the automation and flexibility investments of organizations have increased. The risks but they grow, as there is in fact a lack of awareness of the existence of privileged credentials in DevOps, in RPA (robotic process automation) and in in cloud.

According to the CyberArk Global Advanced Threat Landscape report of 2019, fewer than 50% of organizations have access security strategy for DevOps, and production , RPA and other technologies.


So, the hackers have the ability to do exploit to legitimate access and move in such a way to achieve their goal.

Preventing this lateral movement is one of the reasons for mapping the security investments of organizations. 28% of the total planned security costs over the next two years is centered on the cessation of privilege escalation and lateral movement.

Of the people who participated in the survey, 78% detected hacker attacks on the three biggest threats: organized crime, activists, privileged insiders. On the other hand, 60% of respondents reported as one of the greatest security risks Phishing and then ransomware and Shadow IT.

In practice, research has shown that while organizations regard privileged access security as a key component of an effective cybersecurity program, this understanding has not yet been translated into action to protect digital transformation technologies.

84% of organizations surveyed said IT and critical data would never be completely secure unless privileged accounts and credentials. However, only 49% has a security strategy to preserve them.


CyberArk's executive vice president of global business development, Adam Bosnian, said that more and more organizations are aware of the importance of its risks cyber kill chain and why lateral movement is critical to safety issues. He also said that this awareness is not enough and needs to be transformed into the implementation of preventative strategies to substantially reduce the risk.

Still research shows that 41% of organizations intends to pay fines for non-compliance with key regulations but will not change security policies even after successful cyberattack.

The survey also looked at the impact on organizations of important regulations. From this piece of research we see that 46% of organizations are fully prepared for a violation within 72 hours. 62% of respondents in Australia report that they were fully prepared to comply with the entire statute, which came into force in February of 2019. Finally, only 37% is ready to implement California Consumer Protection Law 2020.


Please enter your comment!
Please enter your name here

In a world without fences and walls, who needs Gates and Windows


Pompeo: "Eliminate Chinese apps from Apple and Google stores"!

US Secretary of State Mike Pompeo on Wednesday called for an extension of the US government's restrictions on Chinese technology, saying that ...

Microsoft brings Android applications to Windows 10!

Microsoft has decided to integrate Android applications into Windows 10 with the new update of the "Your Phone" application.

Nudgebox: From DNA analysis to Covid-19 detection

Nudgebox is the product of a small DNA testing company that a few months ago was trying to gain its place in genetics ...

Twitter: Android error exposes DMs and other user data to hackers!

Twitter announced that it fixed a bug found in the Twitter application for Android, which could allow hackers to ...

Trump: Facebook removes misinformation post about Covid-19

Facebook removes Donald Trump's post claiming that children are "almost immune" to Covid-19.

US: $ 10.000.000 to anyone who identifies election hackers!

A few months before this year's US presidential election to be held in November, the US State Department announced that it will give ...

Hackers can "invade" hospitals through Temi robots!

Temi robots used in hospitals and care centers to help the sick and the elderly, can be found at ...

Ransomware gang threatens Canon for leaking photos!

The Maze ransomware gang appears to be behind a recent cyber attack against Canon.

Why the Edge crashed with Google's default search engine

An explanation has been given by Microsoft, regarding the error that caused the collapse of the Edge, when Google was set ...

Waymo: 18 months in prison for the employee who stole the data!

Anthony Levandowski, former chief engineer of Waymo, was sentenced to 18 months in prison for stealing confidential data from Google.