"Neither Flesh Nor Blood," Hard Code: Soft Entry, Strange Bills, Passive Password Protection, Cyber Shields Up, and Harvest for the Trackers. It's CISO Intelligence for Friday 11th April 2025.

An existential dilemma? Weak defenses, unaccounted expenses, passwords under siege, pro-action before reaction, and sometimes it feels like somebody's watching...

"Neither Flesh Nor Blood," Hard Code: Soft Entry, Strange Bills, Passive Password Protection, Cyber Shields Up, and Harvest for the Trackers. It's CISO Intelligence for Friday 11th April 2025.
Photo by Andrea De Santis / Unsplash
đź’ˇ
"Gives me everything I need to be informed about a topic" - UK.Gov

Table of Contents

  1. The Rise of Machine Overlords: Non-Human Identity Crisis
  2. Key to the 'Centre' of a Storm: Unlocking CentreStack's Hard-Coded Vulnerability
  3. SMS Pumping: How Criminals Turn Your Messaging Service into Their Cash Machine
  4. Fortinet FortiSwitch Flops: Passwords Go the Way of the Dodo
  5. Cyber Threats: The Gift that Keeps on Giving
  6. "Spyware, You're Watching Me?" A Surveillance Saga

The Rise of Machine Overlords: Non-Human Identity Crisis

It’s not Skynet, but it’s close enough to steal your lunch and access your networks.

What You Need to Know

The rapid increase in non-human identities, created primarily by automated systems and interconnected devices, poses a significant security challenge. As C-level executives, your role is to recognize the strategic importance of bolstering identity and access management (IAM) systems to mitigate this emerging risk. Immediate actions include assessing current IAM capabilities, allocating resources for upgrades, and prioritizing training for staff on managing non-human interactions securely.

CISO Focus: Identity and Access Management (IAM), Non-Human Identities
Sentiment: Negative
Time to Impact: Immediate


The interconnected web of our digital universe has given rise to a new breed of entities that inhabit our networks—non-human identities. No, they aren’t malevolent AI cobbled together in some clandestine lab, but they are urgent threats nonetheless. These identities, constituted by bots, services, and scripts, are proliferating at an alarming rate, creating a labyrinth of potential security breaches. It is crucial now more than ever to recognize this burgeoning threat and take definitive action to reinforce identity and access management (IAM) systems.

The Scope of the Identification Crisis

  • Unprecedented Scale: The growth of non-human identities is staggering, with some reports suggesting they outnumber human users in enterprise environments. With automation and IoT devices being integrated into everyday operations, these entities often fly under the radar of traditional IAM strategies.

  • Increased Attack Surface: These identities can be exploited by cybercriminals to gain unauthorized access to sensitive systems. With the complexity of monitoring activities of non-human actors, the window for malicious activity widens.

  • Lack of Visibility: Many organizations lack the proper tools to effectively monitor and manage non-human credentials. This absence of oversight leads to blind spots where unauthorized actions can occur undetected.

The Hesitation to Adapt

Despite the apparent risks, many companies have been slow to adapt their IAM frameworks to cater to non-human identities. A combination of factors, including underestimation of risk and resistance to change, contributes to this dangerous complacency. Organizations that delay action may face significant operational, financial, and reputational impacts.

Strategic Priorities

  1. Enhancing IAM Systems: Stronger, more flexible IAM solutions are necessary to accommodate the distinct needs of non-human entities. This includes moving beyond the username-password paradigm toward multi-factor authentication (MFA) and behavior-based policies.

  2. Visibility Tools: Implementing sophisticated monitoring tools that provide full-spectrum visibility into network activities is crucial. This can help in detecting anomalies early and mitigating risks swiftly.

  3. Identity as a Service (IDaaS): Adopting cloud-based IAM services can offer scalability and improved control over both human and non-human identities.

On the Horizon

  • Compliance: Regulatory frameworks will likely evolve to incorporate requirements for non-human identity management, pushing organizations to align their IAM practices with legal standards.

  • Innovation in AI and Machine Learning: Advances in these fields can offer more refined detection of unusual behaviors in the network, allowing for proactive responses to potential threats.

Avoiding a Future Dystopia

The era of non-human identities is not a distant fantasy but a present reality that demands attention and action. Organizations must navigate this evolution with keen attention to the dynamic threat landscape. Those who understand and implement robust IAM systems today will be the ones who safeguard their digital kingdoms tomorrow.


Vendor Diligence Questions

  1. What capabilities do you offer that specifically address the management of non-human identities?
  2. How do your solutions integrate with existing IAM frameworks and what provisions are there for scalability?
  3. Can you provide case studies or examples of successful IAM enhancement for non-human identities?

Action Plan

  1. IAM Audit: Conduct an immediate review of current IAM practices and identify gaps in non-human identity management.
  2. Policy Update: Develop and enforce updated security policies that account for non-human entities, including a focus on credentials and behavior monitoring.
  3. Training & Awareness: Roll out training programs for all staff to recognize and manage interactions with non-human identities securely.

Source: Explosive Growth of Non-Human Identities Creating Massive Security Blind Spots