“Why hack in…when you can simply log in?” - Cisco unveils Identity Intelligence to combat social engineering breaches

A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
(Image credit: Shutterstock)

The latest offering from Cisco could help stop identity theft and social engineering attacks in its tracks.

According to Jeetu Patel, EVP & GM, Security and Collaboration Business Units at Cisco, cracking through a firewall is old news as it is now easier than ever to exploit the human factor.

This is where Cisco’s Identity Intelligence can help provide a new layer of network observability and security.

 The difference between ‘if’ and ‘should' 

With how advanced social engineering attacks have become, it has never been easier for a hacker to impersonate your voice, disable your multi-factor authentication (MFA), and add their own device onto your network to steal your intellectual property (IP) and ransom your data.

Speaking as Cisco Live in Amsterdam, Patel states that hackers have switched to the mindset of, “why log in… when you can hack in?” 

This is especially relevant, he added, when 74% of attacks utilize a human element to breach an organizations network, such as the example above, or through phishing and malicious emails.

Traditionally, internal access is granted on the basis of asking ‘if’ a user can access a network, but Patel argues that the question should be changed to ask ‘should’ a user have access to a network, and this should be based on their behavior.

Jeetu Patel, Cisco

(Image credit: Future - Benedict Collins)

This latest security offering from Cisco provides the ability to monitor human and machines/services within a network to identify threats based on their behaviors and interactions. The Identity Intelligence platform will generate an identity graph to correlate the behaviors of users, machines and applications.

These behaviors will be based on the role of the users, their physical location and device to identify if there is a threat potential. For example, a user may have previously accessed the network on an old device and forgot to log out.

If this device begins exhibiting unusual behavior on the network, such as existing in a different location or attempting to access applications and services outside of the users role, the device will be flagged as a potential intrusion.

The identity graph will provide observability on old devices and access permissions, allowing network administrators to quickly decommission both of these vulnerabilities through the Cisco Security Cloud.

The platform’s ease of use is further enhanced by access to an AI Assistant in CISCO Security Cloud which provides natural language prompts to generate security access policies for their network and firewall, alongside an AI-based email threat detection.

Speaking on the announcement, Patel said, “Identity is the fabric that connects humans, devices and applications in the workplace, and has become an easy target for modern cybersecurity attacks.

“By analyzing the entire attack surface of an organization’s users, machines, services, apps, data and their behaviors, Cisco Identity Intelligence bridges the chasm between authentication and access. We are the first vendor bringing together identity, networking and security into a complete solution to address the largest cyber challenge of modern times.”

The Identity Intelligence platform will be available as an embedded part of the Security Cloud from July 2024.

More from TechRadar Pro

TOPICS
Benedict Collins
Staff Writer (Security)

Benedict has been writing about security issues for over 7 years, first focusing on geopolitics and international relations while at the University of Buckingham. During this time he studied BA Politics with Journalism, for which he received a second-class honours (upper division), then continuing his studies at a postgraduate level, achieving a distinction in MA Security, Intelligence and Diplomacy. Upon joining TechRadar Pro as a Staff Writer, Benedict transitioned his focus towards cybersecurity, exploring state-sponsored threat actors, malware, social engineering, and national security. Benedict is also an expert on B2B security products, including firewalls, antivirus, endpoint security, and password management.

Read more
AI business data center
"It is literally driving our product development direction" - how Cisco is redefining networking security to better protect against cyberattacks and human error
IT
Cisco wants to utilize AI to keep your new applications and data safe
Security
Protect your network with an AI-secure browser and SASE framework
Hands typing on a keyboard surrounded by security icons
The psychology of scams: how cybercriminals are exploiting the human brain
A representational concept of a social media network
The Attention Alchemists: crafting gold from social engineering
An abstract image of a lock against a digital background, denoting cybersecurity.
Building a resilient workforce security strategy
Latest in Pro
cybersecurity
What's the right type of web hosting for me?
Security padlock and circuit board to protect data
Trust in digital services around the world sees a massive drop as security worries continue
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
construction
Building in the digital age: why construction’s future depends on scaling jobsite intelligence
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)