Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How Businesses Need to Rethink Cybersecurity Posture
Cybersecurity

How Businesses Need to Rethink Cybersecurity Posture

Robert WoodBy Robert WoodOctober 24, 2022Updated:December 1, 20224 Mins Read
Facebook Twitter LinkedIn Email
security primitives
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

There’s a lot of industry activity around emerging security approaches like passwordless authentication. For many years, security professionals’ common mantra has been anchored around longer, more complex passwords. Before that, we emphasized password rotation. Multi-factor authentication often ran alongside these passwords or passphrases. On the surface, terms like passwordless authentication contrasted starkly with the way things have been done.

However, most people can typically agree that doing things in technology the way they’ve always been done is not a good strategy, even in environments that are large, slow-moving, or more traditional in nature. Rethinking concepts that are more primitive in nature (and helping others do the same) is important to collectively move the needle within our industry.

Start the Mindset Shift

To get started with the mindset shift, it’s useful to list out the more primitive needs or elements, versus debating a particular approach.

For example, passwords, complex or otherwise, are a means of authenticating things. Passwords have become almost synonymous with authentication in the same way “Google it” has become a verb around using a search engine to find something.

The more fundamental need beyond passwords is authenticating to something. Authentication can happen through some combination of:

  • Something you know, like a password
  • Something you are, like a biometric reading
  • Something you have, like a token or mobile device
  • Somewhere you are, your geographic location at the time of authentication

The first three are typically accepted as the right way to go about authentication. When you shift the debate from whether you need passwords to what combination of these factors would be secure and resilient to the kinds of attacks that are troubling to an organization (e.g., phishing, credential stuffing, password sharing, and so forth), you can make progress in mindset change.

Building Confidence

Another important approach in shifting a mindset lies in the way you build confidence in something new or different. Working in security, there are numerous opportunities to do this:

  • Exploratory work, pilots, and controlled tests. These are all good approaches to quickly test out ideas to determine their viability within a given environment. Start small and build over time. These approaches also align with the ambidextrous organization model of managing innovation.
  • Red team and security testing. Setting something new up and testing it against existing approaches can be a useful way to build confidence in change. Gaining high-quality, adversarial insights into how resilient something is can help move people towards embracing the new and doing away with the old.
  • Collecting user feedback. This is a powerful way to see how things actually work from those it most directly impacts. When we talk about authentication, this is really important because people might be going through it multiple times a day, every day, depending on the organization and its policies.

Broadly gained confidence within an organization makes it more likely that change will last beyond a given leader’s tenure. The confidence gained can also positively influence the culture surrounding cybersecurity.

The Compliance Angle

Modernization efforts to roll out emerging trends like passwordless technology cannot neglect the importance of compliance. Whether we like it or not, compliance drives a large amount of the decisions that happen in this industry. It fuels funding and anchors third-party risk management programs. Plus, this list wouldn’t be complete without a reference to awareness training. Moving the collective mindset, I believe, can happen through compliance, so often the black sheep of the industry.

Looking through standards like the Cloud Security Alliance Cloud Controls Matrix (CCM), NIST 800-53, and others, there are plenty of references to passwords. I believe we need to push for these things to change and evolve at this level. If we can’t do that or until we do that, as a professional changing the mindset within an organization, we need to have answers as to how we satisfy “compliance” through modernized approaches to age-old problems.

Concluding Thoughts

Other emerging trends, such as Zero Trust, will inevitably help the matters described in this article. Traditional means of authenticating are not phishing resistant. Countless data breaches have proven that this approach is not adequate, yet we can’t move the needle through FUD (fear, uncertainty, and doubt). Approaching workforce development and mindset change from an iterative and explorative cycle of confidence building will go a long way to seeing lasting change.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

authentication Compliance Cybersecurity Cybersecurity channel featured Featured Post passwordless
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

Microsoft, Gong Detail How AI and Integration Partnership Drives Higher Sales Performance

June 24, 2025

AI Industrialization of America Rolls On as AWS Plans Data Centers in Coal Country

June 24, 2025

Snowflake to Acquire Crunchy Data to Power Agentic AI with PostgreSQL Integration

June 24, 2025

AWS Data Centers Opening in Coal Country: ‘AI-Industrialization’

June 24, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Microsoft, Gong Detail How AI and Integration Partnership Drives Higher Sales Performance
  • AI Industrialization of America Rolls On as AWS Plans Data Centers in Coal Country
  • Snowflake to Acquire Crunchy Data to Power Agentic AI with PostgreSQL Integration
  • AWS Data Centers Opening in Coal Country: ‘AI-Industrialization’
  • Larry Ellison Declares Oracle Will Be #1 in Cloud Databases, Apps, and AI Data Centers

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.