• About
  • Subscribe
  • Contact
Thursday, January 29, 2026
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home FutureCISO Process Compliance and Governance

Digital identities at risk with legacy PKI

FutureCISO Editors by FutureCISO Editors
January 26, 2026
The better way of securing privileged access

Photo by George Becker: https://www.pexels.com/photo/close-up-gray-hoppe-tubular-key-115642/

Share on FacebookShare on Twitter

A Ponemon Institute study highlights critical vulnerabilities in existing public key infrastructure (PKI) systems. Nearly 56% of organisations have reported experiencing disruptions due to unplanned outages tied to expired certificates, indicating an urgent need for a reevaluation of PKI management practices.

PKI, which secures digital identities through the creation and management of digital certificates, is becoming increasingly strained due to the rapid rise of machine and workload identities.

As organisations transition to cloud-native and zero-trust environments, they face an exponential increase in certificate volume and complexity. However, many are still relying on outdated PKI approaches that are not equipped to handle these growing demands.

The study reveals that 34% of organisations cite high costs and risks associated with legacy PKI systems as the primary barriers to secure certificate management. On average, firms manage over 114,000 internal certificates with only four full-time staff members dedicated to PKI oversight. This resource scarcity has forced 63% of participants to outsource their PKI management, exacerbating the risks involved.

The consequences of manual PKI processes are significant. The report notes that 60% of organisations have suffered security exploits due to weak cryptography, while a further 58% experienced compromises through third-party certificate authorities. Notably, 43% reported incidents of private key theft, underlining the urgent need for more robust and automated security measures.

Commenting on on the findings, Kurt Sand, general manager of machine identity security at CyberArk, says: “The rapid expansion of machine identities has completely changed the PKI operating model."

Kurt Sand

"The complexity of managing an increasing number of certificates is compounded by legacy systems, manual processes, and resource constraints.” Kurt Sand

He emphasises that the financial and operational impact of unmanaged PKI will worsen unless organisations modernise and automate their certificate management processes.

Related:  AI-driven cyber threats: A US$212 billion security investment by 2025

Despite the critical role of PKI in ensuring digital trust and security, only 46% of organisations expressed confidence in their PKI systems' compliance capabilities.

Those that have implemented automation and unified visibility report fewer outages and a higher likelihood of meeting compliance requirements. Interestingly, 61% of organisations confirming effectiveness in their PKI strategies have integrated AI technologies, compared to just 50% overall.

Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, echoes these concerns: “PKI is critically important to ensuring trust, security, and privacy in digital communications. However, as shown in the research, organisations lack confidence in their ability to protect against security threats.”

Tags: automationcybersecuritydigital identityPKIPonemon Institute
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • Digital identities at risk with legacy PKI
  • PodChats for FutureCISO: Practical defence strategies against industrialised cyber threats
  • More Singapore firms setting up own SOCs
  • 2026: When autonomous AI transforms cyber attacks and security models
  • Recalibrating CISO strategies amid AI complexity

Categories

  • Artificial Intelligence
  • Blogs
  • CISO
  • CISO strategies
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Compliance and Governance
  • Compliance and Governance
  • Compliance and Governance|People
  • Compliance and Governance|Technology
  • Computer, Storage, Networks, Connectivity
  • Culture and Behaviour
  • Culture and Behaviour|People
  • Cyber risk management
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity careers
  • Cybersecurity operations
  • Cybersecurity operations
  • Data Protection
  • Data Protection
  • Endpoint Security
  • FutureCISO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • Incident Response
  • Network Security
  • People
  • Process
  • Remote work
  • Resources
  • Risk Management
  • Risk Management
  • Security
  • Technology
  • Training and awarenes
  • Videos
  • Vulnerabilities and threats
  • Vulnerabilities and threats
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl