PrivacyHIGH

Automation and NHI Security Risks - Key Findings Revealed

Featured image for Automation and NHI Security Risks - Key Findings Revealed
#Keeper Security#NHI#AI#automation#security risks

Original Reporting

SCSC Media

AI Intelligence Briefing

CyberPings AIΒ·Reviewed by Rohit Rana
Severity LevelHIGH

High severity β€” significant development or major threat actor activity

πŸ”’
πŸ”’ PRIVACY IMPACT
Policy/Law Nameβ€”
Jurisdictionβ€”
Affected OrganizationVarious Enterprises
Data Type InvolvedMachine Credentials, NHI Access
Users AffectedIT Professionals, Organizations
Enforcement Bodyβ€”
Fine/Penaltyβ€”
Violation TypeExcessive Privilege Granting
Consumer Rights Impactβ€”
🎯

Basically, companies are using automated tools that can be risky if not managed properly.

Quick Summary

A new report highlights serious security risks linked to automation and non-human identities in enterprises. Over 40% of experts reported incidents last year. Organizations must improve management practices to protect their data.

What Happened

A recent report from Keeper Security unveiled significant security risks associated with automation and the use of non-human identities (NHIs) in organizations. This report was presented at the RSA Conference and sheds light on the increasing reliance on AI-powered tools, service accounts, and API keys for system interactions.

Who's Affected

The findings are particularly concerning for IT professionals and organizations that utilize automated systems. Over 40% of surveyed experts reported experiencing security incidents related to machine credentials or NHIs in the past year. This indicates a widespread issue across various sectors, especially those heavily reliant on automation.

What Data Was Exposed

While the report does not specify exact data breaches, it emphasizes that excessive privileges granted to automated tools without proper oversight can lead to significant vulnerabilities. The lack of visibility into these systems poses a serious threat to data security.

What You Should Do

Organizations are urged to develop a cohesive strategy that integrates secrets control and password management to enhance data security. Here are some steps to consider:

  • Implement standard guidelines for managing automated tools and NHIs.
  • Increase visibility into AI and automation processes within your systems.
  • Regularly audit machine access and privileges to ensure they are appropriate.

The Call for Action

Darren Guccione, CEO of Keeper Security, highlighted the urgent need for organizations to adopt a comprehensive approach to managing NHIs. As automation continues to grow, so do the complexities of securing these non-human identities. Without proper management and oversight, organizations risk exposing themselves to significant security threats.

πŸ” How to Check If You're Affected

  1. 1.Review access logs for automated tools and NHIs.
  2. 2.Conduct regular audits of privileges granted to non-human identities.
  3. 3.Implement monitoring solutions to track NHI activities.

🏒 Impacted Sectors

TechnologyFinanceHealthcare

Pro Insight

πŸ”’ Pro insight: The findings underscore the critical need for organizations to implement robust access controls and visibility measures for NHIs to mitigate potential security incidents.

Sources

Original Report

SCSC Media
Read Original

Related Pings

HIGHPrivacy

TikTok Removes Covert Networks Amid Hungary Election Concerns

TikTok has taken action against covert networks spreading disinformation before Hungary's elections. Fake accounts targeted political content, raising serious concerns. The integrity of the electoral process is at stake as voters prepare to head to the polls.

The RecordΒ·
HIGHPrivacy

Mass Surveillance - EFFector Explores Troubling Trends

The latest EFFector newsletter sheds light on mass surveillance issues. It reveals how crime prevention tech is misused, impacting civil liberties. Join the fight for privacy and free speech.

EFF DeeplinksΒ·
HIGHPrivacy

VeraCrypt - Windows Users May Face Boot Issues Soon

VeraCrypt's developer warns of potential boot issues for Windows users after Microsoft locked his account. This could prevent many devices from starting up. Users are advised to stay informed as the situation develops.

TechCrunch SecurityΒ·
MEDIUMPrivacy

Browser Guard - Protecting Your Privacy from Extensions

Browser extensions can leak your personal information to advertisers and scammers. Malwarebytes' Browser Guard enhances privacy by minimizing detectable traces, keeping your data safe. Stay protected while browsing!

Malwarebytes LabsΒ·
HIGHPrivacy

Identity Visibility - Shrinking the IAM Attack Surface

Identity management is at a breaking point with fragmentation risks. Nearly half of identity activities go unseen, threatening security. The IVIP model aims to enhance visibility and control.

The Hacker NewsΒ·
HIGHPrivacy

Telegram Hacking Tools - Men Targeting Women Exposed

New research reveals men are using Telegram to buy hacking tools for harassment. This troubling trend highlights the urgent need for stricter online regulations. Victims, mainly women, face severe privacy violations. Action is needed to protect individuals from these abusive practices.

Wired SecurityΒ·