NEW Threat Research: When AI Gets Hijacked: Exploiting Hosted Models for Dark Roleplaying

[Krebs On Security] [Our Blog]
Illustration Cloud

Permiso Universal Identity Graph: Why Universal Identity Is Key to Solving Security Siloes

Permiso Security is excited to announce the release of the Universal Identity Graph, providing identity security risk visibility for all entity identities, including human and non-human, across all environments. 

Rise of cloud security siloes

Organizations are increasingly making use of cloud services for critical business functions. Today every critical services layer is cloud hosted, everything from your identity provider, password vaults, people and customer management, collaboration platforms to CI/CD platforms. In fact, Gartner predicts over 50% of enterprises will be leveraging industry cloud platforms to accelerate their business initiatives. This expansion of cloud services including Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS), has resulted in hundreds of security solutions being developed and deployed to solve specific security use cases in each of these layers. It has unfortunately also led to siloed security tools stitched together which are becoming less effective in detecting and responding to identity security threats that traverse multiple environments.

Alert fatigue

One unfortunate outcome of this siloed approach is that it generates a flood of low fidelity alerts that lack context and correlation. The flood of alerts that the typical organization faces explains why the typical organization is unable to triage 50% of alerts received in a day. It also sets the scene on why solution sprawl and alert fatigue dominate so much of the conversation today. These conversations almost always include discussions over the ROI and the need to consolidate the security stack.

It is also often within this vein that discussions on best-of-breed vs best-of-suite arise as cloud security platforms continue their expansion through acquisition, often with diminishing returns of security value to their customers as a result.

The pain is real

The growing sense of frustration among customers is valid. The low-fidelity, uncorrelated alert volumes that most solutions produce are leaving organizations vulnerable.

This pain is laid bare in the multiple security incidents the Permiso Security team have detected and responded to. Despite having all the well-known brands associated with the SIEMs, CSPMs, XDRs, CIEMS, DSPMs, and SSPMs, and MDRs in the market, most organizations are still unable to determine whether they have been compromised, let alone being able to quickly respond to a multi-environment identity breach.

By relying solely on siloed security solutions, organizations are left with a partial view of their identity attack surface.

One way of understanding whether your organization might be falling victim to this challenge is by asking yourself whether you can at any point in time determine who your top 10 riskiest identities, both human and non-human, are across all environments?

"Permiso's platform provides us with a comprehensive view of our identity risk. With their new Universal Identity Graph engine, we're able to mitigate high-risk identities in real time, giving us added peace of mind that our most valuable assets are protected. Permiso's solution has enhanced our ability to detect and respond to threats, making our organization more resilient to cyber attacks."

Eric Tan, CIO & Chief Security Officer at Flock Safety

A better way is here

That is why Permiso Security was founded, to comprehensively deal with identity risks and threats across a fragmented ecosystem, with the focus on addressing the greatest threat vector, insecure human, and non-human identities. Through the Universal Identity Graph, Permiso tracks all-entity identities (human and non-human) and their relationships to other identities, credentials, and assets, across multiple environments (IdP -> IaaS -> PaaS -> SaaS).

The Universal Identity Graph is coupled with 1k+ detection rules, combined with ML behavior-based detections which detect anomalous activity as it arises, in-the-moment.

Multi-Plane-Alert - highlights

This unparalleled identity security capability provides a birds-eye view of your identity risk, dynamically, in real-time. Now organizations can detect threats like account takeover, credential compromise and insider threat, while reducing the identity attack surface through removing zombie identities and unnecessary privileges.

With Permiso’s Universal Identity Graph you can at any time determine who your top 10 riskiest identities are and proactively manage access and permissions for any environment, not just your IaaS or SaaS services layer.

Only with this unified approach can organizations shine a light on the siloes where threat actors such as LUCR-3 (aka Scattered Spider) hide in their attempt to compromise high value data such as source code.

With the Universal Identity Graph, Permiso can expose potential attack paths for highly privileged identities, while also triggering far fewer, but much higher-fidelity alerts that are tied back to the identity that is actioning them, even when shared credentials are used.

The net result: When an advanced identity attack is underway Permiso alerts to that threat in real time, drastically slashing the Mean Time to Detect and Mean Time to Respond, while keeping your data secure.

Permiso finally provides security leaders and practitioners with a better way to secure all identities consistently and comprehensively for all environments from a single console.

Reach out for a demo.

ABOUT PERMISO 

Permiso’s unified identity security solution bridges the gap between siloed cloud security tools by securing human and non-human identities across the IdP, IaaS, PaaS and SaaS layers. We enable security organizations to harden their identity security posture and detect and respond to malicious activity, which can include account takeover, credential compromise and insider threat aiming to compromise sensitive data. 

Illustration Cloud

Related Articles

When AI Gets Hijacked: Exploiting Hosted Models for Dark Roleplaying

Key Takeaways Attacks against GenAI Infrastructure like AWS Bedrock have increased substantially over the last six (6) months. Particularly with exposed access keys. Attackers are hijacking victim GenAI infrastructure to power their own LLM

Introducing Azure Activity Log Axe: An Open-Source Tool to simplify and improve the analysis of Azure Activity logs

We are excited to formally announce the public availability of Azure Activity Log Axe, an open-source tool designed to simplify and improve the analysis of Azure Activity logs. The tool, initially unveiled at the fwd:cloudsec conference in

Strategies Used by Adversaries to Steal Application Access Tokens

Introduction In today's complex landscape of modern cybersecurity, organizations and cyber-defenders must remain vigilant as adversaries continuously refine their tactics, techniques, and procedures (TTPs) to exploit vulnerabilities in applications

View more posts