SaaS platform complements other identity and access management, privilege access management, and custom identity solutions as cybercriminals prioritize stolen access credentials. Credit: Foundry Cybersecurity vendor Inside-Out Defense has emerged from stealth with the launch of a new privilege access abuse detection and remediation platform. The SaaS, agentless platform supports all environments and applications, complementing existing identity and access management (IAM), privilege access management (PAM), and custom identity solutions, the firm said.Stolen access credentials are highly attractive to cybercriminals looking for routes into company networks and systems. What’s more, access brokers – criminal groups that sell stolen access credentials – have become a key component of the eCrime threat landscape, with elevated privileges typically having the highest asking prices.Privilege access abuse significant contributor to data breachesPrivilege abuse through compromised identities are significant contributors to data breaches. Without the ability to see how access is used throughout an enterprise, CISOs and cybersecurity teams can be blindsided. Tools such as PAM solutions can aid management of privileged credentials to stop or slow an attacker’s movement through a network. However, Inside-Out Defense claimed that today’s cybersecurity market is flushed with point solutions that only look for a few known privilege abuse signatures and are reactive in nature, detecting abuses after the event. The Inside-Out Defense platform enables the determination of gaps between known and unknown abuse behaviors to detect privilege abuse as it happens, the vendor said in a press release. Inside-Out Defense said the platform’s key features include:Privilege abuse remediation: The platform detects access abuse behaviors in real time and provides in-line remediation of malicious privilege access through a kill switch.Access intent: Customers get a 360-degree profile of malicious access requests, their context, and intent, offering a real-time view of the organization’s access posture.Coverage across the entire organization: Coverage across the organization’s environments includes infrastructure (cloud and on-premises), applications (SaaS, managed, unmanaged), APIs, and human/ non-human users.“Many enterprise organizations struggle to maintain a comprehensive view of privilege access that has been awarded to their employees,” said Mark Settle, author of Truth from the Valley, A Practical Primer on IT Management for the Next Decade and former Okta CIO. This confusion results from the wide array of IT resources supporting daily business operations and the complex ways access can be granted, delegated, transferred, or assumed, he added. Cybercriminals prioritize stolen credentials, access broker demand increasesCybercriminals are doubling down on stolen credentials, demonstrating a clear demand for access broker services. There was a 112% year-over-year increase in advertisements for access broker services identified last year compared to 2021, with more than 2,500 advertisements for access detected across the criminal underground, according to the CrowdStrike 2023 Global Threat Report. There was also a notable shift away from malware use related to adversaries’ prolific abuse of valid credentials to facilitate access and persistence in victim environments, the research found.Several brokers advertised access in bulk during 2022, while others continued to use the “one-access one-auction” technique, according to CrowdStrike. The most advertised sectors by access brokers in 2022 were the academic, technology, and industrial sectors, with government, healthcare, and retail the least advertised. Related content news WordPress users not on Windows urged to update due to critical LiteSpeed Cache flaw Updating to version 6.4 or higher will prevent exploitation of the vulnerability that allows attacker to gain admin access. By Lynn Greiner 23 Aug 2024 3 mins Threat and Vulnerability Management Identity and Access Management Vulnerabilities how-to 3 key strategies for mitigating non-human identity risks For every 1,000 human users, most networks have around 10,000 NHIs, and that can be a huge task to manage. Here are 3 fundamental areas to focus on when securing NHIs. By Chris Hughes 22 Aug 2024 6 mins Data and Information Security Identity and Access Management Risk Management news Dashlane study reveals massive spike in passkey adoption One in five users has at least one passkey stored, but a security consultant issues a reality check, saying in a sense ‘they are still passwords.’ By Paul Barker 31 Jul 2024 5 mins Identity and Access Management Security feature NHIs may be your biggest — and most neglected — security hole Because IT has so little visibility into non-human identities, attackers are increasingly seeking them out as ultra-easy onramps to everything of value in your enterprise. The solution? Stop treating NHIs as though they are another human end-user. By Evan Schuman 23 Jul 2024 9 mins Application Security Identity and Access Management Network Security PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe