The password identification disaster: Evolving authentication strategies in 2024 and past


Join leaders in San Francisco on January 10 for an unique night time of networking, insights, and dialog. Request an invitation right here.

In as we speak’s sprawling IT panorama patchworking quite a few cloud and SaaS apps and disparate gadgets and networks, simply typing in a username and password now not cuts it from a cybersecurity standpoint. 

First of all, usernames are sometimes easy and predictable — sometimes an individual’s electronic mail, title or initials. Secondly, passwords might be simple to guess. Startlingly, the most typical passwords (sure, even in 2023) are “Admin,” “12345,” “12345678,” “1234” and “password,” based on analysis from Outpost24

Not surprisingly, then, utilizing stolen credentials is among the prime methods attackers entry a company, and greater than half (54%) of all assaults within the final 12 months started with compromised logins

All of this, specialists say, means we have to transfer in the direction of a passwordless — or no less than password-enhanced — future marked by heightened authentication strategies. 

VB Event

The AI Impact Tour

Getting to an AI Governance Blueprint – Request an invitation for the Jan 10 occasion.


Learn More

Here are a number of evolving identification administration strategies to keep watch over in 2024. 

If you don’t have MFA in place, you’re already manner behind

Multi-factor authentication (MFA) is among the most simple step-ups in identification administration: If your enterprise has not integrated it already, you’re far behind, specialists warn. 

The technique requires customers to offer greater than a username and password — sometimes an SMS from their smartphone, a one-time password (OTP) despatched to their electronic mail deal with, a USB key or authenticator app or biometric authenticator (extra on that under). 

According to the Cybersecurity and Infrastructure Security Agency (CISA): “MFA increases security because even if one credential becomes compromised, unauthorized users will be unable to meet the second authentication requirement and will not be able to access the targeted physical space, computing device, network or database.” 

Zero belief on its method to changing into actual

Zero belief, or “least privilege access” is one other rising technique that assumes that each consumer may pose a official risk. Throughout their time in a community or system, customers should regularly confirm themselves, and they’re solely granted entry to what they want once they want it. 

“Everything is authenticated and authorized,” Dell world CTO John Roese instructed VentureBeat. “Everything is tightly coupled in real-time.”

Zero belief techniques log and examine all community visitors and grant entry to customers at varied levels based mostly on their stage of privilege and an enterprise’s safety insurance policies. The technique additionally authenticates each machine, community and connection based mostly on insurance policies and context from quite a few information factors. 

While the idea has been talked about for a while, it has but to be absolutely realized as a result of it’s complicated to include, significantly relating to legacy techniques that have already got quite a few safety controls in place. But with the elevated progress of AI built-from-scratch ‘greenfield’ techniques, specialists say that 2024 would be the 12 months zero belief turns into actual. 

“We’ve spent 2023 talking about zero trust and its importance to cybersecurity,” stated Roese. “In 2024, zero trust will evolve from a buzzword to a real technology with real standards, and even certifications emerging to clarify what is and is not zero trust.”

Just-in-time extends restricted, momentary entry

An extension of zero belief is just-in-time (JIT) entry, which grants momentary and time-limited entry solely when required for particular duties. 

“This access is provided on-demand, right at the moment when the user requests it, and it is automatically revoked after the allotted time or task completion,” explains the SaaS administration platform Zluri.

Critical to privileged entry administration (PAM), it’s based mostly on entry insurance policies and guidelines and incorporates verification strategies equivalent to momentary tokens. 

Users request entry to a selected occasion, machine or digital machine, which is then evaluated by admins and both granted or denied. After use in a short-term timeframe, they then sign off and entry is robotically revoked till required once more sooner or later. 

“Instead of always granting access, JIT access limits it to a specific timeframe,” Zluri writes. This manner, it reduces the chance of cyber attackers or insiders misusing privileged accounts and gaining unauthorized entry to delicate information.”

Passkeys remove the necessity for passwords altogether

Moving towards the passwordless future, passkeys are digital credentials that permit customers to create on-line accounts with out the necessity for passwords. 

“Passkeys allow users to authenticate without having to enter a username or password, or provide any additional authentication factor,” according to Google

Passkeys leverage Web Authentication (WebAuthn) APIs collectively developed by the business affiliation FIDO Alliance and the World Wide Web Consortium (W3C). Using private and non-private keys which can be mathematically linked, passkeys can decide whether or not a consumer is who they declare to be. 

“You can think of them like interlocking puzzle pieces; they’re designed to go together, and you need both pieces to authenticate successfully,” based on password administration firm 1Password

Public keys might be seen by web sites or apps, whereas personal keys stay secret — they’re by no means shared with websites customers need to go to or saved on their servers. 

When customers go to web sites that assist passkeys, they create an account and select an choice to safe it with a passkey — whether or not a cellphone, pc, pill or different machine — reasonably than a password. They then affirm their authenticator and a passkey is generated for that particular website domestically on a consumer’s machine. 

The subsequent time the consumer indicators in, the web site challenges their authenticator, prompting it to finish a signature that’s verified in opposition to the general public key. 

“If 2022 was the year of being passkey-curious and 2023 was the year of hedging bets by making passkeys optional, 2024 will be the year that we see two or three major services providers go all in on passkeys,” predicts 1Password chief product officer Steve Won. 

Still, “It will still take another five years for passkey-only authentication to be adopted more broadly,” he added. 

At the identical time, challenges equivalent to integration with legacy techniques and consumer training should be addressed, cautioned Michael Crandell, CEO of password administration platform Bitwarden

“A balanced approach prioritizing both security and user experience will be key in advancing these security measures,” he stated. 

Biometrics: The final credential that may’t be misplaced or stolen

But the actual identification authenticator of the long run, many say, is biometrics, or varied bodily traits which can be distinctive to a selected individual. 

This can embody voice, facial, iris and retina recognition and fingerprint and palm scanning.

Researchers additionally declare that the form of an individual’s ear, the best way they sit and stroll, their veins, facial expressions and even physique odors are distinctive identifiers. 

“Each person’s unique biometric identity can be used to replace or at least augment password systems for computers, phones, and restricted access rooms and buildings,” based on cybersecurity firm Kaspersky

Advanced techniques use pc imaginative and prescient, sensors and scanners to seize an individual’s distinctive traits, then leverage AI and machine studying (ML) to scan that info throughout a saved database to approve or deny entry. 

While there are nonetheless many safety, privateness and surveillance considerations round the usage of biometrics, specialists say their apparent benefits are that customers don’t have to recollect usernames or passwords and that private traits are at all times with that one individual — they’ll’t be misplaced or stolen. 

“In other words,” writes Kaspersky, “biometric security means your body becomes the ‘key’ to unlock your access.”

VentureBeat’s mission is to be a digital city sq. for technical decision-makers to realize data about transformative enterprise know-how and transact. Discover our Briefings.


Please enter your comment!
Please enter your name here