New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home AI & Robotics

How rampant robotic process automation (RPA) adoption is introducing new threat vectors

New York Tech Editorial Team by New York Tech Editorial Team
October 30, 2021
in AI & Robotics
0
How rampant robotic process automation (RPA) adoption is introducing new threat vectors
Share on FacebookShare on Twitter

Robotic process automation (RPA) is nothing new. In fact, it’s an automation toolkit that was first introduced back in the 1990’s. But in 2020, in the midst of a global pandemic and the all new remote work norm, RPA interest and adoption hit a new high. Why? Because with RPA, digital workers are able to take over repetitive, manual tasks traditionally performed by their human counterparts — freeing up time, energy and critical human resources.

Gartner’s Fabrizio Biscotti, research vice president, put it best: “The key driver for RPA projects is their ability to improve process quality, speed and productivity, each of which is increasingly important as organizations try to meet the demands of cost reduction during COVID-19. Enterprises can quickly make headway on their digital optimization initiatives by investing in RPA software, and the trend isn’t going away anytime soon.”

In fact, Gartner predicts that by 2022, 90 percent of organizations globally will have adopted robotic process automation (RPA). What’s more, through 2024, larger enterprises are expected to triple the capacity of their existing RPA portfolios.

Yet, in today’s world, we know that when it comes to adopting emerging technologies, cybersecurity is far too often an afterthought. Even more vitally, when it comes to RPA adoption, organizations aren’t just adopting new technologies — and the threat vectors and bad actors that inevitably come with them in the digital age — they’re adopting new identities as well. Machine identities that have access to the DNA, the networks, and the ins and outs of the business.

So as RPA adoption continues to accelerate, it’s imperative that organizations proactively account for the cybersecurity concerns that will inevitably come — and prepare for them accordingly.

Why the RPA risk

In order to proactively mitigate any RPA risk, organizations must first understand that RPA — these new ‘digital workers’ — have identities of their own.

MetLife’s Gaurav Priyadarshi writes, “Introducing a new technology to an organization always comes with certain vulnerabilities that can be exploited by hackers. For example, automated solutions or bots may not have the ability/functionality to identify malware, thereby increasing the threat and providing opportunity to hackers.”

Just like you and me, these new digital identities have ‘minds’, capabilities and access of their own. They’re equal employee counterparts, who have just as much access to sensitive systems as you or I, and they can just as easily give up that access if not properly secured.

Earlier this year, Forrester predicted that 33 percent of breaches in 2021 will be insider threat-related. Meaning that over a quarter of all breaches that take place this year will be due to exploited employee credentials (i.e. bad actors taking advantage of internal access), or internal cybersecurity negligence. With that being said, RPA is just another avenue for bad actors to potentially take advantage of unprotected or unmanaged insider access or credentials. Particularly as ‘identity sprawl’ proliferates, and organizations find themselves having to manage more disparate ‘identities’ (both human or non-human), the need for proactive, preventative cybersecurity has never been greater.

Mitigating RPA-related threats

Zero Trust — an industry framework largely predicated on the notion ‘never trust, always verify’ — was lauded as an industry best practice this year.

What Zero Trust essentially means is that if someone tries to access your networks, data, or any business asset, they’d be required to validate their identity before gaining access or entry whether they are the CEO or an intern, and that same practice should be standard for RPA, or ‘digital identities’. Risk isn’t one size fits all, and there are no guarantees when it comes to identity security, so a Zero Trust approach is one major way organizations can mitigate risk when it comes to RPA.

Another way to minimize RPA cyber concerns is through third-party security solutions like privileged access management (PAM). Through a PAM system, when a digital worker needs privileged access, the robot can retrieve credentials automatically, without any exposure to the bot owners or developers. This in turn, not only provides a full audit trail (i.e. which digital workers accessed which applications), but also provides individual accountability and proof that no one can obtain the password, in a noncompliant manner, without slowing down robotic operations.

With a PAM tool that connects to RPA systems, organizations are better equipped to proactively secure, control and audit the credentials and privileges of the bots. Plus by choosing a PAM solution that is easy to deploy, and one that integrates seamlessly into your pre-existing security stack, PAM can be achieved quickly without compromising the productivity that RPA affords.

Like any other new technology, RPA is at its best when the business ROI is high, and the security risk is low. But as new bad actors and threat vectors continue to emerge, it’s critical that enterprises build cybersecurity into the core of their business growth strategy — leveraging it in tandem with new technologies. Making it more than just an afterthought.

Image credit: Sergey Tarasov / Shutterstock

Bhagwat Swaroop serves as President and General Manager of Quest’s One Identity Business Unit and joined the company in November 2020. He is responsible for driving the overall strategy, product innovation, GTM and P&L for One Identity. Bhagwat is a seasoned strategic leader and brings a deep understanding of the enterprise security landscape, technology ecosystem, SaaS and cloud-driven business models. He is a sought-out expert and public speaker on Cybersecurity and implementing Identity Centric Security models in the cloud age.


Credit: Source link

Previous Post

Wallace State holds STEM Academy for area fifth graders | News

Next Post

How Venture Capitalists Think Cryptocurrencies Will Reshape Commerce

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
How Venture Capitalists Think Cryptocurrencies Will Reshape Commerce

How Venture Capitalists Think Cryptocurrencies Will Reshape Commerce

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
The Future of “I Do”: How Technology is Revolutionizing Weddings in 2025

The Future of “I Do”: How Technology is Revolutionizing Weddings in 2025

March 19, 2025
Eldad Tamir

AI vs. Traditional Investing: How FINQ’s SEC RIA License Signals a New Era in Wealth Management

March 17, 2025
Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

March 16, 2025
Arvatz and Iyer

PointFive and Emertel Forge Strategic Partnership to Elevate Enterprise FinOps in ANZ

March 13, 2025
Global Funeral Traditions Meet Technology

Global Funeral Traditions Meet Technology

March 9, 2025
Canditech website

Canditech is Revolutionizing Hiring With Their New Product

March 9, 2025

Recommended

The Future of “I Do”: How Technology is Revolutionizing Weddings in 2025

The Future of “I Do”: How Technology is Revolutionizing Weddings in 2025

March 19, 2025
Eldad Tamir

AI vs. Traditional Investing: How FINQ’s SEC RIA License Signals a New Era in Wealth Management

March 17, 2025
Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

March 16, 2025
Arvatz and Iyer

PointFive and Emertel Forge Strategic Partnership to Elevate Enterprise FinOps in ANZ

March 13, 2025

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

3D bio-printing acoustic AI Allseated B2B marketing Business carbon footprint climate change coding Collaborations Companies To Watch consumer tech cryptocurrency deforestation drones earphones Entrepreneur Fetcherr Finance Fintech food security Investing Investors investorsummit israelitech Leaders LinkedIn Leaders Metaverse news OurCrowd PR Real Estate reforestation software start- up startupnation Startups Startups On Demand startuptech Tech Tech leaders technology UAVs Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media