By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Identity Security Has an Automation Problem—And It’s Bigger Than You Think
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Identity Security Has an Automation Problem—And It’s Bigger Than You Think
Computing

Identity Security Has an Automation Problem—And It’s Bigger Than You Think

News Room
Last updated: 2025/05/22 at 7:18 AM
News Room Published 22 May 2025
Share
SHARE

May 22, 2025The Hacker NewsEnterprise Security / Identity Management

For many organizations, identity security appears to be under control. On paper, everything checks out. But new research from Cerby, based on insights from over 500 IT and security leaders, reveals a different reality: too much still depends on people—not systems—to function. In fact, fewer than 4% of security teams have fully automated their core identity workflows.

Core workflows, like enrolling in Multi Factor Authentication (MFA), keeping credentials secure and up to date, and revoking access the moment someone leaves—are often manual, inconsistent, and vulnerable to error. And when security execution relies on memory or follow-up, gaps appear fast.

Human error remains one of the biggest threats to enterprise security. Verizon’s 2025 Data Breach report found that the human element was involved in 60% of breaches. The same manual missteps that led to breaches a decade ago still expose identity systems today. Cerby’s 2025 Identity Automation Gap research report shows just how widespread the issue is—and how far automation still has to go.

The last mile still runs on human error

The data reveals a persistent reliance on human action for tasks that should be automated across the identity security lifecycle.

  • 41% of end users still share or update passwords manually, using insecure methods like spreadsheets, emails, or chat tools. They are rarely updated or monitored, increasing the likelihood of credential misuse or compromise.
  • Nearly 89% of organizations rely on users to manually enable MFA in applications, despite MFA being one of the most effective security controls. Without enforcement, protection becomes optional, and attackers know how to exploit that inconsistency.
  • 59% of IT teams handle user provisioning and deprovisioning manually, relying on ticketing systems or informal follow-ups to grant and remove access. These workflows are slow, inconsistent, and easy to overlook—leaving organizations exposed to unauthorized access and compliance failures.

Organizations can’t afford to wait

The consequences are no longer hypothetical.

According to the Ponemon Institute, 52% of enterprises have experienced a security breach caused by manual identity work in disconnected applications. Most of them had four or more. The downstream impact was tangible: 43% reported customer loss, and 36% lost partners.

These failures are predictable and preventable, but only if organizations stop relying on humans to carry out what should be automated. Identity is no longer a background system. It’s one of the primary control planes in enterprise security. As attack surfaces expand and threat actors become more sophisticated, the automation gap becomes harder—and riskier—to ignore.

Why the automation gap persists

Why do these manual gaps still exist if automation is so critical to identity security? They’ve emerged as a byproduct of rapid growth, application sprawl, and fragmented infrastructure.

  1. Disconnected applications are everywhere, and they don’t support the common identity standards required for integration into existing providers. A majority of enterprise applications fall into this category, and that number continues to grow. They span every business function and are packed with sensitive data.
  2. IT & security teams assume tools = coverage. Environments today stretch across SaaS, mobile, cloud, and on-prem systems. Shadow IT continues to grow faster than anyone can track, as each business unit brings its own stack. Achieving full control across all applications remains highly elusive.
  3. Stopgap solutions don’t scale. Password managers, manual scripts, and other vaulting tools are difficult to maintain and often create fragmented infrastructure. When integrations don’t exist, they’re frequently patched together—but these fixes are costly to build and fragile to sustain. What starts as a workaround quickly becomes an ongoing operational burden.

Closing the automation gap

The good news: closing the automation gap doesn’t require rebuilding or replacing your identity stack. It means completing it.

Forward-thinking organizations are bringing automation to every corner of their application ecosystem without waiting for native integrations. Some teams are also exploring AI agents to help close this gap. But trust is still evolving: 78% of security leaders say they don’t trust AI to fully automate core identity tasks—yet 45% support a collaborative human-in-the-loop model.

Cerby provides organizations with the flexibility to support both approaches—meeting teams where they are and delivering automation where it’s needed most.

Cerby’s research report, The 2025 Identity Automation Gap, includes findings from 500+ IT and security leaders and practical steps for closing one of the most overlooked risks in enterprise security.

Download the full report or schedule a 15-minute demo to see how Cerby brings automation across your entire identity surface.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Why Britain can’t afford to miss the stratospheric opportunity of space tech – UKTN
Next Article Even if OpenAI gets Jony Ive to design the next AI device, I don’t think it’ll be an iPhone killer | Stuff
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Who Knew Radiator Valves Had So Much Data? Here’s How I Made Them Talk | HackerNoon
Computing
This affordable smart doorbell is under $100 and lets AI answer the door for you | Stuff
Gadget
Microsoft: SMEs stand to gain £78bn from AI adoption – UKTN
News
The AirPods Max with USB-C are a great Memorial Day deal at $70 off 
News

You Might also Like

Computing

Who Knew Radiator Valves Had So Much Data? Here’s How I Made Them Talk | HackerNoon

3 Min Read
Computing

Ubuntu 25.10 Switching To Chrony By Default, Enabling Network Time Security

1 Min Read
Computing

In 2025, Local Music on iPhone Is a Nightmare—So I Built My Own Way Out | HackerNoon

21 Min Read
Computing

How to Centralize Your Campaign Execution |

9 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?