CSLATEST
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
zero trust<br />
THE IMPERATIVE FOR ZERO TRUST<br />
AS ORGANISATIONS EMBRACE DIGITAL TRANSFORMATION TO GAIN ACCESS TO THE CLOUD'S MANY BENEFITS,<br />
COMPUTING ENVIRONMENTS ARE FACED WITH EVOLVING INTO BORDERLESS IT ECOSYSTEMS<br />
As we continue to digitally<br />
transform organisations, so<br />
the importance of secure and<br />
reliable digital identities has grown.<br />
According to Scott Silver, CEO, Integral<br />
Partners, part of the Xalient Group,<br />
2024 is poised to usher in a multitude<br />
of innovations and trends in this area,<br />
ranging from advanced biometrics to<br />
the integration of artificial intelligence<br />
and machine learning to meet the<br />
changing needs of businesses,<br />
individuals and governments.<br />
"As organisations embrace digital<br />
transformation, computing environments<br />
are evolving into borderless IT<br />
ecosystems," he warns. "Digital identities<br />
are also evolving at pace and identity<br />
security is now a crucial aspect of<br />
cybersecurity. 2024 will usher in a<br />
multitude of identity innovations,<br />
ranging from advanced biometrics<br />
to artificial intelligence integration<br />
to meet the needs of businesses,<br />
individuals and governments.<br />
"Increasingly, cybercriminals are<br />
creating synthetic identities by combining<br />
stolen personal information from<br />
several people into a new false identity<br />
that doesn't rely on real person-al data.<br />
"They use these identities to build a<br />
shallow history that passes identity<br />
checks with banks and retailers.<br />
To counter these tactics, biometrics,<br />
such as facial recognition, fingerprint<br />
scanning and voice recognition, are<br />
becoming popular as a stronger means<br />
of identity verification."<br />
Despite these countermeasures,<br />
however, the threat is large and<br />
growing, driven by Cybercrime-as-a-<br />
Service (CaaS) that allows criminals to<br />
procure tools enabling them to easily<br />
carry out identity-based attacks.<br />
"This makes it even more important for<br />
businesses to prioritise identity security,<br />
employing policies and tools that also<br />
monitor employees and prevent insider<br />
incidents."<br />
AI and machine learning are important<br />
tools for organisations seeking to combat<br />
identity risk. "AI-powered pattern and<br />
behaviour recognition capabilities can<br />
identify anomalies and detect fraudulent<br />
attempts in real-time. Machine<br />
learning algorithms act as adaptive<br />
detectives, continuously evolving to<br />
recognise new identity fraud tactics,<br />
enhancing the overall accuracy of the<br />
verification process.<br />
"Zero trust architecture is the<br />
foundation of modern cybersecurity,<br />
with secure networking and identity<br />
security as cornerstones. Zero Trust<br />
involves the application of identity and<br />
access management capabilities to<br />
perform continuous risk assessment<br />
every time resources are accessed. It<br />
uses contextual identity information to<br />
optimise access policies, while enforcing<br />
the principle of least privilege."<br />
Zero Trust controls reduce insiders'<br />
ability to access systems and data that<br />
aren't part of their job, adds Silver.<br />
"Now, organisations are seeking<br />
AI-powered identity and access<br />
management in a single solution that<br />
Scott Silver, CEO, Integral Partners.<br />
integrates seamlessly with zero trust<br />
architecture, combined with professional<br />
support. These solutions enable<br />
fast, effective responses to potential<br />
breaches and, alongside identity, will<br />
play a pivotal role in the evolution of<br />
zero trust models."<br />
Identity is seen as the new enterprise<br />
perimeter, and managing interdependencies<br />
between identity, security and<br />
networking to adhere to true zero trust<br />
principles is a considerable challenge -<br />
one that the Xalient Group is addressing,<br />
he says, as a provider of IAM<br />
services and solutions through its recent<br />
acquisitions of Grabowsky and Integral<br />
Partners. "Together, we can develop the<br />
advanced, AI-powered identity management<br />
solutions that companies need in<br />
today's complex security environment."<br />
www.computingsecurity.co.uk @CSMagAndAwards May/June 2024 computing security<br />
29