Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Identity takes center stage as a leading factor in enterprise cyberattacks

By CIO Dive by By CIO Dive
May 13, 2026
Home Enterprise IT
Share on FacebookShare on Twitter


Dive Brief:

  • Seven out of every 10 organizations suffered at least one identity-related breach over the past year, according to a report released Tuesday by Sophos. Organizations, on average, reported three separate identity-related incidents during that time.

  • Two-thirds of ransomware victims said the cyberattack stemmed from an identity-related incident, said Sophos. The report is based on a survey of 5,000 IT and cybersecurity leaders across 17 countries. 

  • The mean recovery cost was $1.64 million, read the report, and the median cost was $750,000. Seven of every 10 respondents reported recovery costs of more than $250,000.

Dive Insight:

The report underscores the increasing role identity plays in modern enterprise security. 

“Identity is now the perimeter of cybersecurity, and that perimeter is expanding faster than most organizations can track,” Chester Wisniewski, Director, Global Field CISO at Sophos, told Cybersecurity Dive via email. “As cloud adoption, remote work, and machine-to-machine connectivity accelerate, every credential, API key, service account, and OAuth token becomes a potential entry point.”

Hackers are increasingly using identity as the main point of attack, Wisniewski said, because it allows them to bypass traditional security defenses, move laterally within systems and get faster access to sensitive data.

Identity-based cyberattacks impact critical sectors as well. Oil and gas and utility companies, followed by government agencies, reported the highest breach rates across various industries. 

Successful identity attacks are largely due to a combination of human error and poor management of non-human identities, according to the report. Only 24% of companies regularly monitor for unusual logins and fewer than one-third of organizations regularly rotate non-human credentials.  



Source link

By CIO Dive

By CIO Dive

Next Post
ZTE ospita a San Paolo il Broadband User Congress 2026, dedicato al tema “Monetize Your Intelligent Broadband”

ZTE ospita a San Paolo il Broadband User Congress 2026, dedicato al tema "Monetize Your Intelligent Broadband"

Recommended.

HashiCorp Previews the Future of Agentic Infrastructure Automation with Project infragraph

HashiCorp Previews the Future of Agentic Infrastructure Automation with Project infragraph

September 25, 2025
Q2i’s PARCA Technology Moves to Phase II of National Institutes of Health (NIH) Clinical Trial to Further Evaluate Its Efficacy in Increasing Community Supervision Success

Q2i’s PARCA Technology Moves to Phase II of National Institutes of Health (NIH) Clinical Trial to Further Evaluate Its Efficacy in Increasing Community Supervision Success

January 22, 2025

Trending.

Weibo Publishes 2025 Environmental, Social and Governance Report

Weibo Publishes 2025 Environmental, Social and Governance Report

April 28, 2026
It Takes 2 Minutes to Hack the EU’s New Age-Verification App

It Takes 2 Minutes to Hack the EU’s New Age-Verification App

April 18, 2026
Chunghwa Telecom 2025 Form 20-F filed with the U.S. SEC

Chunghwa Telecom 2025 Form 20-F filed with the U.S. SEC

April 15, 2026
2025 Wired, WLAN Gartner Magic Quadrant: Cisco Drops To Challenger, NaaS Specialists Join

2025 Wired, WLAN Gartner Magic Quadrant: Cisco Drops To Challenger, NaaS Specialists Join

July 14, 2025
CTIA Names Preston Wise Senior Vice President of External and State Affairs

CTIA Names Preston Wise Senior Vice President of External and State Affairs

May 6, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio