Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsAlways-On Privileged Access Is Pervasive — and Fraught with Risks
Always-On Privileged Access Is Pervasive — and Fraught with Risks
Cybersecurity

Always-On Privileged Access Is Pervasive — and Fraught with Risks

•January 28, 2026
0
CSO Online
CSO Online•Jan 28, 2026

Companies Mentioned

Greyhound Research

Greyhound Research

CyberArk

CyberArk

CYBR

Forrester

Forrester

Moor Insights & Strategy

Moor Insights & Strategy

Deloitte

Deloitte

McKinsey

McKinsey

Honda Canada

Honda Canada

Why It Matters

Persistent high‑privilege access expands attack vectors and raises the likelihood of costly human error, threatening security and compliance. Mitigating it is essential for resilient, scalable operations in today’s dynamic IT environments.

Key Takeaways

  • •91% of users retain permanent high-level privileges
  • •Legacy governance fuels persistent privileged access across enterprises
  • •Just-in-time models adopted by less than 1% organizations
  • •Machine identities now dominate privilege landscape, outpacing human controls

Pulse Analysis

The latest CSO Online survey reveals that 91 % of enterprise end‑users stay logged in with their highest privilege, a figure that underscores how entrenched always‑on access has become. Analysts attribute this to decades of lax governance, where privileged accounts were created for legacy systems and never retired. As mergers, cloud migrations and rapid patch cycles pile on, those dormant credentials continue to prop up integrations, batch jobs and recovery scripts, turning predictability into a hidden security liability. The result is a massive attack surface that attackers can exploit for lateral movement.

Traditional PAM and IAM solutions were built for static, human‑centric environments, assuming administrators log in, perform a task, then log out. Modern enterprises, however, run dynamic workloads, auto‑scaled containers and API‑driven services that maintain standing access 24/7. This mismatch forces organizations to either tolerate risky permanent credentials or deploy cumbersome approval workflows that users bypass. The emergence of non‑human identities—service accounts, CI/CD pipelines, autonomous agents—exacerbates the problem, as they often hold broader permissions than any single human and cannot be reviewed with legacy processes.

To break the cycle, enterprises must adopt just‑in‑time and risk‑based access models that grant privileges only for the duration of a specific task. Integrating automated credential rotation, fine‑grained policy enforcement and continuous monitoring can reduce reliance on standing accounts while preserving operational continuity. Coupled with a zero‑trust architecture that treats every identity—human or machine—as untrusted until verified, these controls enable scalable governance of the exploding non‑human identity pool and lower the likelihood of accidental or malicious misuse.

Always-on privileged access is pervasive — and fraught with risks

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...