Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint //

Authentication

Intelligent Authentication Market Grows to Meet Demand

Confidence in user identity is critical to prevent fraud and theft, and companies are looking for new ways to get the necessary assurance.

It's 2019 and we still don't know who the users are. That's a conclusion that both IT executives and growing security companies are eager to see solved. And according to a report from Research and Markets, that eagerness should drive the advanced authentication market to a 12% compound annual growth rate (CAGR) from 2019 to 2024.

The real issue in authentication is increasing the confidence in the user's identity while decreasing the time and effort required for legitimate users to go through the authentication process. It's a complex problem that has seen proposed solutions as diverse as Google's Android-based two-factor authentication, Auth0's Sign In with Apple program, and Arkose Labs' challenge and response mechanism. Companies are investing in developing winning authentication strategies for a simple reason: Billions of dollars are at stake.

Jeremiah Grossman, founder of WhiteHat Security and chief of security strategy for SentinelOne, has joined the advisory board of Arkose Labs. He says the companies developing advanced authentication strategies are trying to change the basic economics with which the criminals work. Today, he says, "If you give any company a million dollars to spend on computer security, they're not going to be able to do very much with it because an adversary might have to spend a thousand dollars to counteract their millions. The only way that we're going to make ground in computer security is by reversing it, meaning every thousand we spend they have to spend a million to beat us. Then we'll get somewhere."

That "somewhere" would seem to involve a place in which it's more difficult to steal and use credentials — especially credentials for accounts with elevated privileges in the network and application infrastructure. A breach at cloud service provider PCM Inc., revealed by Krebs on Security in mid-June, illustrates the importance of enhanced authentication routines.

The credentials taken by the criminals in this case were for administrative accounts used to manage Office 365 installations for PCM's customers. Once the customer accounts were breached, the criminals then used individual user information to perpetrate gift card fraud, an increasingly common way for criminals to monetize their activities without involving banks or other mainstream financial institutions.

"To avoid suffering the same fate as PCM, enterprises must implement security solutions that scan and monitor all assets and detect vulnerabilities that could be exploited — like PCM's lack of multifactor authentication or other identity verification features within its Office 365 system," says Jonathan Bensen, CISO of Balbix. "By failing to secure its Office 365 with tighter controls and therefore putting its clients' bottom lines at risk due to gift card fraud, PCM and its customers stand to suffer significant damage."

In response to the PCM breach and similar crimes, Krebs on Security reports that Microsoft will now require multifactor authentication for all its managed service providers offering Office 365. It's not a new technology solution, but it is now being applied by contractual force.

The sheer size of the damage is finally getting the attention of the enterprise, though. According to a new report by Industry Research, the global fraud detection and prevention market was valued at $13.59 billion in 2018 and is expected to reach $31.15 billion by 2024, a CAGR of 16.42%

Grossman says that the willingness to apply a solution is as critical as the technology involved. "If we look at the vast majority of breaches over the last 10 or 20 years, with rare exceptions, infosec knew how to prevent the break-in." He explains, "In every one of the cases, we had technological solutions and controls that we could have put in to stop everything except zero days."

What has been lacking, Grossman says, is the financial incentive to build in security. "Those in the best position to do something about it aren't necessarily incentivized to do something about it. It's why we have identity theft and not loan fraud, because the incentives were in the wrong place."

Related content:

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

 

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
EdwardThirlwall
50%
50%
EdwardThirlwall,
User Rank: Moderator
7/24/2019 | 2:19:48 AM
Close off the pathways
When there's a will, there's a way mate. Even with artificial intelligence governing private information and improving on security measures, there are still plenty of methods to gain illegal and unauthorized access if the crooks are resourceful enough. Sure it'll get harder for them to do so, which is the ultimate aim, but in no way are we supposed to rest on our laurels regarding this. We need to keep improving to make sure that all avenues of attack are snuffed out!
UdyRegan
50%
50%
UdyRegan,
User Rank: Apprentice
7/22/2019 | 3:24:21 AM
Sad reality
It is sad to say that security concerns are growing as the days go by. This is the reason for the spike in demand for authentication needs in various industries. Demands have grown tremendously as users know exactly how attacks are becoming more prominent even down to the smallest scale of a user. This is the sad but real truth that we all have to accept and counter on our side.
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12420
PUBLISHED: 2019-12-12
In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.
CVE-2019-16774
PUBLISHED: 2019-12-12
In phpfastcache before 5.1.3, there is a possible object injection vulnerability in cookie driver.
CVE-2018-11805
PUBLISHED: 2019-12-12
In Apache SpamAssassin before 3.4.3, nefarious CF files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA 3.4.3, we recommend that users should only use update channels or 3rd party .cf ...
CVE-2019-5061
PUBLISHED: 2019-12-12
An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to different denial of service scenarios, either by causing CAM table att...
CVE-2019-5062
PUBLISHED: 2019-12-12
An exploitable denial-of-service vulnerability exists in the 802.11w security state handling for hostapd 2.6 connected clients with valid 802.11w sessions. By simulating an incomplete new association, an attacker can trigger a deauthentication against stations using 802.11w, resulting in a denial of...