Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Judge blocks large layoffs for Trump administration in education sector

HALO Security achieves SOC 2 Type 1 compliance and validates security controls of the attack surface management platform

Kraken opens the digital tokens of Apple, Tesla, nvidia outside us

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Identity security has an automation problem, which is bigger than you think
Identity

Identity security has an automation problem, which is bigger than you think

userBy userMay 22, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 22, 2025Hacker NewsEnterprise Security/Identity Management

Identity Security

For many organizations, identity security appears to be under control. On paper, everything is checked out. However, Cerby’s new research, based on insights from over 500 IT and security leaders, reveals a different reality. In fact, less than 4% of security teams fully automate their core identity workflows.

Core workflows, such as registering with Multifactor Authentication (MFA), keeping your credentials safe and up-to-date, and revoking moments someone leaves behind, are often manual, inconsistent and vulnerable to errors. Also, if security execution depends on memory or follow-up, gaps will appear faster.

Human error is one of the biggest threats to enterprise security. Verizon’s 2025 data breach report found that human elements were involved in 60% of violations. The same manual failure that led to a breach ten years ago still exposes identity systems today. Cerby’s 2025 Identity Automation Gap Research Report shows how widespread the issue is and how automation still needs to go ahead.

The last mile is still performed with human error

This data reveals a persistent reliance on human behavior on tasks that should be automated throughout the identity security lifecycle.

41% of end users use insecure methods such as spreadsheets, emails, and chat tools to manually share or update their passwords. They are rarely renewed or monitored, increasing the likelihood of misuse of qualifications or compromise. Despite MFA being one of the most effective security management, nearly 89% of organizations rely on users to manually enable MFA in their applications. Without enforcement, protection is an option and attackers know how to take advantage of that inconsistency. 59% of IT teams handle user provisioning and leaving manually, relying on the ticketing system or informal follow-up to allow and remove access. These workflows are slow, inconsistent and easy to overlook. Removes organizations that are exposed to unauthorized access and compliance obstacles.

Organizations can’t afford to wait

The results are no longer hypothetical.

According to the Ponemon Institute, 52% of businesses experience security breaches caused by manual identity work in disconnected applications. Most of them were more than four. The downstream impact was specific. 43% reported losses for customers, and 36% reported losing partners.

These obstacles are predictable and preventable, but only if an organization stops relying on humans to do what it should be automated. Identity is no longer a background system. This is one of the main control planes of enterprise security. As the surface of the attack grows and threat actors become more refined, the automation gap becomes more difficult and risky.

Why automation gaps last?

Why do these manual gaps exist when automation is so important to identity security? They emerged as a by-product of rapid growth, application sprawl, and fragmented infrastructure.

Disconnected applications are everywhere and do not support the common identity criteria needed to integrate into existing providers. The majority of enterprise applications fall into this category, and the number continues to grow. They span all business functions and are packed with sensitive data. IT and security teams assume tools = coverage. Today’s environments span across SaaS, mobile, cloud, and on-plame systems. Shadows continue to grow faster than anyone can track, as each business unit brings its own stack. Achieving full control in all applications remains extremely elusive. The STOPGAP solution does not scale. Keeping password managers, manual scripts, and other safe tools is difficult, and often create fragmented infrastructure. If integrations are not present, they are patched frequently, but these fixes are expensive to build and vulnerable to maintain. What starts as a workaround will soon become an ongoing operational burden.

Close automation gap

Good news: No rebuilding or replacing the ID stack is required to close the automation gap. That means completing it.

Advanced organizations bring automation to every corner of the application ecosystem without waiting for native integration. Some teams are exploring AI agents to fill this gap. But trust is still evolving. 78% of security leaders say they don’t trust AI to fully automate core identity tasks.

Cerby gives organizations the flexibility to support both approaches. Provides automation when the teams you have are most needed.

Cerby’s research report, 2025 Identity Automation Gap, includes findings from over 500 IT and security leaders, and includes practical steps to close one of the most overlooked risks in enterprise security.

Download the full report or schedule a 15-minute demo to see how Cerby brings automation across your entire identity surface.

Did you find this article interesting? This article is a donation from one of our precious partners. Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSterling Event Group is aiming for a nationwide expansion
Next Article University of Bristol Semiconductor Devices Unlock 6G Infrastructure
user
  • Website

Related Posts

Critical Windows Server 2025 DMSA vulnerability allows for active directory compromise

May 22, 2025

Chinese hackers exploit Ivanti EPMM bug in global enterprise network attacks

May 22, 2025

Learn how to build a rational and legally defensible cybersecurity program

May 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Judge blocks large layoffs for Trump administration in education sector

HALO Security achieves SOC 2 Type 1 compliance and validates security controls of the attack surface management platform

Kraken opens the digital tokens of Apple, Tesla, nvidia outside us

Bitcoin will surge beyond $111,000 from $74,508 a month ago amid new optimism

Trending Posts

Iran says it will hold us accountable for Israel’s attack on nuclear presence | Military News

May 22, 2025

Trump’s Ramaphosa “Ambshell”: Important Takeout from Heated White House Conference | Donald Trump News

May 22, 2025

Tottenham’s defeat of Man UTD focuses on financial distress | Football News

May 22, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

HALO Security achieves SOC 2 Type 1 compliance and validates security controls of the attack surface management platform

Bitcoin will surge beyond $111,000 from $74,508 a month ago amid new optimism

Openai acquires Jony Ive’s AI device startup for $6.5 billion

Google Veo 3’s AI video realism broke the internet with a street interview that never happened

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.