Passwords continue to be a security problem

Ten CISOs from across industries have predicted that the days are numbered for the password as the sole authentication method. They see enterprises moving to augment or supplant the traditional password with advanced technologies, such as biometrics.

Security Current, an information and collaboration company, talked with various CISOs to find that they agree that passwords are inherently flawed because they depend on users to create and remember complex sequences of letters, numbers and characters. However, they found that users tend to take the path of least resistance, selecting sequences that are easy to remember  and often easy to crack.

“Despite industry-wide efforts to reinforce this method of authentication and the number of methods available to encrypt and store passwords, the fact that remains is that creating good passwords  and safeguarding them  is as difficult as rocket science,” said Nikk Gilbert, ConocoPhillips director of global information protection and assurance.

Aaron’s, Inc. CISO Chris Bullock isn’t as quick to dismiss the password, and suggests it is a necessary layer in a multi-faceted authentication schema.

“Just like the locks on our front doors can’t stop a determined burglar or home invader 100% of the time, we continue to invest in door locks and alarms to protect our property,” said Bullock. “When used correctly, passwords can still be an effective layer of defense, yet we should continue to innovate in the area of authentication.”

Aetna CISO Jim Routh agrees that no single method of authentication by itself is sufficient, and although technologies like multi-factor authentication and smart cards have been available for years, they do not have the frictionless ease of use that is required for large-scale consumer adoption. And according to Valley Health CISO Frank Bradshaw, this is why the industry is moving towards a “who you are” not “what you have” approach.

They noted that next generation technology, such as biometrics, and adaptive cognitive and behavioral techniques, can reduce risk and provide a relatively seamless user experience. But there is general consensus that although the industry will continue to innovate and evolve no method will work 100% of the time.

Related posts

The Imperative of Robust Business Continuity Amidst Technology Disruptions

Closing the Cybersecurity Skill Gap: The Crucial Role of GenAI in Training and Supporting Cybersecurity Professionals

Enhancing Supplier Security Monitoring with AI and ML

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More