The consensus among major research firms (Gartner, NIST, Thales) is that we are entering an era of “Identity Fragility,” where the existing vulnerabilities in MFA Authentication methods are being industrialized by increasingly sophisticated and more easily usable deep fake AI tools.
This is compounded by global political uncertainty with the incentive for antagonistic nation states to sponsor offensive Cyber-attacks.
Multi-factor authentication (MFA) will remain essential over 2026–2027, but attackers are already bypassing it at scale by exploiting the seams around tokens, devices, enrolment, and users rather than breaking the underlying cryptography. ***Click Here for the White Paper ***
Pros & Cons of Identity as a Service
Although written from a self proselytising viewpoint there are worthwhile generic arguments here (click for link to pdf)
Appointment of Eleanor Meritt
We are delighted that Eleanor Meritt has joined as our advisor to help advance our CASQUE Technology. She is an experienced executive who has led global engineering teams, driving major growth and innovation in cloud solutions, legacy migration, process improvement,...
TIME TO STOP INSIDER THREAT
CASQUE technology can provably reduce the risk of Insider attack by eliminating plausible deniability, detecting clone attempts in real time, and securing access with dynamic, quantum-resilient multi-factor authentication. Click for Overview
Unskilled Cyber Criminals win with AI
The advancement of deep fakes makes biometric authentication weaker due to the ability of sophisticated AI-generated media to convincingly replicate physical traits such as facial features, voices, and even behavioural patterns. Deep fakes can create realistic images...
Trends in Cyber Security for 2024
The Cybersecurity landscape is constantly shifting, making it difficult to be sure what will be the most challenging top threats. However, based on current trends and expert predictions, I have tried to highlight the major categories of Cybersecurity Threats we're...
I AM SPARTACUS
Does your Identity Management System rely on User identifiable information to on-board? Many 2-Factor Authentication methods are self-provisioning, often relying on an email link or mobile number which can be found by social engineering and make Attacker...
WordPress Threats
WordPress powers 43% of all the websites, using CASQUE MFA eliminates third party threats Until now, two intractable problems persist to cause damage; the Insider threat and the risk caused by the lag between a breach occurring and its detection.CASQUE is the only...
Quis custodiet ipsos custodes?
The recent Uber breach is distinguished by the shock of its ordinariness.Most Privilege Account Management products control access to the credentials of Privileged Accounts by hiding them in a secure vault. Of course, its not a good idea to have the access to the...
Self-provisioning MFA
If your MFA rollout is based on self-provisioning, it may have intrinsic vulnerabilities.According to Mandiant, Hackers exploited this to gain access to a Microsoft Azure Account, here is the link:...
Showcase of the best UK Business
Recently featured in the Showcase of the best of British business.This is the link to a recent interview with Basil Philipsz, CEO and founder of Distributed Management Systems.