• About
  • Subscribe
  • Contact
Thursday, June 5, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home Technology Endpoint Security

Navigating the identity security threat landscape in Hong Kong

FutureCISO Editors by FutureCISO Editors
March 4, 2024
Photo by Frank Barning from Pexels: https://www.pexels.com/photo/photo-of-buildings-in-the-city-at-night-4968063/

Photo by Frank Barning from Pexels: https://www.pexels.com/photo/photo-of-buildings-in-the-city-at-night-4968063/

Share on FacebookShare on Twitter

CyberArk affirms its support for the identity security threat landscape in Hong Kong amidst the growing number of identity-led cybersecurity threats.

According to the CyberArk 2023 Identity Security Threat Landscape Report, more than half (56%) of security decision-makers in Hong Kong admitted that there have been inadequate security for the highest-sensitivity access for employees in their organisations in 2023.  

Sandy Lau

“Over the past year, we have observed an increase in the prevalence of threat actors engaging in identity fraud using advanced technologies, such as deepfake, which has resulted in significant financial and data loss for organisations,” said Sandy Lau, district manager, Hong Kong and Macau, CyberArk. 

Cybersecurity predictions 

Based on CyberArk’s 2024 cybersecurity predictions, cybercriminals will continue to maximise AI and generative AI through real-time deep fake technology to launch attacks.

Moreover, CyberArk predicts supply chain attacks to increase in 2024. Unfortunately, a CyberArk study revealed that more than half (56%) of organisations in Hong Kong admitted being unable to stop or detect such attacks that exploit interconnected targets to infiltrate more secure systems.

Cybercriminals are using session hijacking and cookie theft to gain unauthorised access to web services and accounts by stealing user session information and cookies. 

Mitigating threats

It is vital to secure browser and web isolation technologies to mitigate risks associated with session hijacking, cookie theft, and other web-based threats.

“Organisations looking to build a long-term cyber resilience strategy should focus on mitigating identity-centric risk today to address their largest attack surface head-on and reduce their cyber debt,” adds Lau.

Related:  Sophos advances active adversary defenses with new security
Tags: Artificial IntelligenceCyberArkcybersecuritydeepfake
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • Platform to enhance software development security
  • Check Point launches enhanced branch office security gateways
  • BarracudaOne to offer a unified approach to cybersecurity
  • AI agents present new security challenges in Southeast Asia
  • Red Hat launches Enterprise Linux 10 for hybrid security

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl