{"id":40428,"date":"2021-04-13T18:00:22","date_gmt":"2021-04-13T18:00:22","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=93327"},"modified":"2021-04-13T18:00:22","modified_gmt":"2021-04-13T18:00:22","slug":"how-far-have-we-come-the-evolution-of-securing-identities","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-far-have-we-come-the-evolution-of-securing-identities\/","title":{"rendered":"How far have we come? The evolution of securing identities"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/04\/SUR18_Holiday_Contextual_4577_RGB.png\" class=\"ff-og-image-inserted\"><\/div>\n<p><em>The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Product Marketing Manager <a href=\"https:\/\/www.linkedin.com\/in\/nataliagodyla\/\" target=\"_blank\" rel=\"noopener noreferrer\">Natalia Godyla<\/a> talks with <a href=\"https:\/\/www.linkedin.com\/in\/troyhunt\/\" target=\"_blank\" rel=\"noopener noreferrer\">Troy Hunt<\/a>, founder of <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Have I Been Pwned<\/a>, information security author, and instructor at Pluralsight. In this blog, Troy shares his insights on the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity\" target=\"_blank\" rel=\"noopener noreferrer\">evolution of identity<\/a>, from the biggest gaps in identity to modern technology solutions.&nbsp;<\/em><\/p>\n<p><strong>Natalia: How has identity evolved over the past 10 years?<\/strong><\/p>\n<p><strong>Troy:<\/strong> There is so much identity-related data about other people accessible to everyone that the whole premise of having confidence in identity has fundamentally changed. A few years ago, I was invited to <a href=\"https:\/\/securityledger.com\/2017\/12\/congress-told-breaches-sharing-spell-end-of-authentication-by-what-we-know\/\" target=\"_blank\" rel=\"noopener noreferrer\">testify in Congress<\/a> about how knowledge-based authentication has been impacted by data breaches. The example I gave was that my father called a telecommunications company to shift his broadband plan to another tier. He told them his name and they asked for his date of birth, as if that\u2019s a secret.<\/p>\n<p>The biggest shift is with this premise that identity can somehow be assured based on knowledge-based authentication like date of birth, mother\u2019s maiden name, where you went to school, or, in the United States, Social Security number. That idea is fundamentally flawed and is a big area of identity that needs to change. There are so many services that have absolutely no reason to have your date of birth but do.<\/p>\n<p><strong>Natalia: What are the current gaps in identity solutions?<\/strong><\/p>\n<p><strong>Troy:<\/strong> The traditional approach in the United States, where someone says, \u201cJust give us your Social Security number and then we\u2019ll know it\u2019s you and it will be fine,\u201d has always been inherently flawed, but it\u2019s even more flawed now.<\/p>\n<p>The bigger concern is what if other people try to prove my identity? I\u2019m concerned about SIM swapping because there\u2019s so much identity assurance that is done via SMS. The telecommunications companies will say, \u201cYou shouldn\u2019t be doing that. You can\u2019t be confident the person who owns the number is the right person.\u201d And the banks will say, \u201cThis is kind of all we have.\u201d I asked my telco, \u201cCan we put a lock on my SIM so the only way someone can migrate my SIM is if they come into your office and prove identity with a passport or driver\u2019s license?\u201d That would eliminate a lot of the problems. They said, \u201cWe can\u2019t do that because it would be anticompetitive. Government legislation says we need to make it easy for people to transfer their number to another provider so that people have freedom of choice. Otherwise, they\u2019re locked into the provider.\u201d And I responded with, \u201cThe outcome of that\u2014depending on the platform I\u2019m using\u2014could be that someone gets into a really important account of mine.\u201d Their response: I shouldn\u2019t have been using SIMs as a means of identity verification.<\/p>\n<p><strong>Natalia: How can organizations mitigate identity risk?<\/strong><\/p>\n<p><strong>Troy:<\/strong> For many organizations, there hasn\u2019t been a lot of forethought around what happens when incidents impact identity. One example is breach preparedness. For many years, many organizations would do disaster recovery planning\u2014the annual entire-site-has-gone-down exercise. I rarely see them drill into the impact of a data breach. Organizations rarely dry run what happens when information is leaked that may enable others to take on identities.<\/p>\n<p>One organization that had a data breach and <a href=\"https:\/\/www.eweek.com\/security\/imgur-image-hosting-service-discloses-breach-of-1-7m-users-accounts\/\" target=\"_blank\" rel=\"noopener noreferrer\">did exceptionally well with disclosure<\/a> was Imgur. Within 24 hours, they had all the right messaging sent to everyone and cycled passwords. I asked the Chief Technical Officer, \u201cHow did you do this so quickly?\u201d And he said, \u201cWe plan for it. We had literally written the procedures for how we would deal with an incident like this.\u201d That preparedness is often what\u2019s lacking in organizations today.<\/p>\n<p><strong>Natalia: What\u2019s the biggest difference between enterprise and consumer identity technologies?<\/strong><\/p>\n<p><strong>Troy:<\/strong> With internal, enterprise-facing identity, these individuals work for your organization and are probably on the payroll. You can make them do things that you can\u2019t ask customers to do. Universal 2nd Factor (U2F) is a great example. You can ship U2F to everyone in your organization because you\u2019re paying them. Plus, you can train internal staff and bring them up to speed with how to use these technologies. We have a lot more control in the internal organization.<\/p>\n<p>Consumers are much harder. They are more likely to just jump ship if they don\u2019t like something. Adoption rates of technologies, like <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity\/mfa\" target=\"_blank\" rel=\"noopener noreferrer\">multifactor authentication<\/a>, are extremely low in consumer land because people don\u2019t know what it is or the value proposition. We also see organizations reticent to push it. A few years ago, a client had a 1 percent adoption rate of two-factor authentication. I asked, \u201cWhy don\u2019t you push it harder?\u201d They said that every time they have more people using two-factor authentication, there are more people who get a new phone and don\u2019t migrate their soft token or save the recovery codes. Then, they call them up and say, \u201cI have my username or password but not my one-time password. Can you please let me in?\u201d And they have to go through this big spiral\u2014how do we do identity verification without the thing that we set up to do identity verification in the first place?<\/p>\n<p><strong>Natalia: What should you consider when building systems and policies for consumers to balance user experience and security?<\/strong><\/p>\n<p><strong>Troy:<\/strong> One big question is: What is the impact of account takeover? For something like Dropbox, the impact of account takeover is massive because you put a lot of important stuff in your Dropbox. If it\u2019s a forum community like catforum.com, the impact of account takeover is minimal.<\/p>\n<p>I\u2019d also think about demographics. Dropbox has enormously wide adoption. My parents use Dropbox and they\u2019re not particularly tech-savvy. If we\u2019re talking about Stack Overflow, we\u2019ve got a very tech-savvy incumbent audience. We can push harder on asking people to do things differently from what they might be used to, which is usually just a username and a password.<\/p>\n<p>Another question is: Is it worth spending money on a per individual basis? My partner, who\u2019s Norwegian, can log on to her Norwegian bank using a physical token. The physical token is not just an upfront cost for every customer but there\u2019s also a maintenance cost. You\u2019re going to have to cycle them every now and then, and people lose them. And you need to support that. But it\u2019s a bank so they can afford to make that investment.<\/p>\n<p><strong>Natalia: What\u2019s your advice on securing identities across your employees, partners, and customers?<\/strong><\/p>\n<p><strong>Troy:<\/strong> I recommend some form of strong authentication in which you have confidence that a username and a password alone are not treated as identity. That worries me, particularly given there\u2019s so much credential stuffing, and there are billions of credential pairs in lists. There\u2019s also the big question: How did we establish identity in the first place? Whether it be identity theft or impersonation or even sock puppet accounts, how confident do we need to be in the identity at the point of registration, and then subsequently at the point of reauthentication? That will drive discussions around what level of identity documentation we need. But again, we come back to the fact that we don\u2019t have a consistent mechanism in the industry, or in even in one single geography, to offer high assurance of identity at the time of registration.<\/p>\n<p><strong>Natalia: Passwordless is a huge buzzword. A lot of people think of it as a solution to many of our identity problems. What\u2019s your perspective?<\/strong><\/p>\n<p><strong>Troy:<\/strong> I first started doing interviews a decade ago and people would ask, \u201cWhen are we going to get rid of passwords? Are we still going to have passwords 10 years from now?\u201d Well, we\u2019ve got more passwords than ever, and I think in 10 years, we will have more passwords. Even as we get <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity\/passwordless\" target=\"_blank\" rel=\"noopener noreferrer\">passwordless solutions<\/a>, the other passwords don\u2019t go away.<\/p>\n<p>I have a modern iPhone, and it has Face ID. The value proposition of Face ID is that you don\u2019t need a password. You are passwordless to authenticate your device. When the phone came, I took it out of the box and had to get on the network. What\u2019s the network password? I\u2019ve got no idea, so I go to 1Password and pull it out. So, there\u2019s one password. Then, the phone asks: Would you like to restore from iCloud? What\u2019s your iCloud password? We\u2019re two passwords in now. Would you like to use Face ID? Yes, because I want to go passwordless. That\u2019s cool but you\u2019ve got to have a password as a fallback position. Now, we\u2019re three passwords in to go passwordless. <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/12\/17\/a-breakthrough-year-for-passwordless-technology\/\" target=\"_blank\" rel=\"noopener noreferrer\">Passwordless doesn\u2019t necessarily mean we kill passwords<\/a> altogether but that we change the prevalence with which we use them.<\/p>\n<p><em>Keep an eye out for the second part of the interview where Troy Hunt shares best practices on how to secure identities in today\u2019s world.<\/em><\/p>\n<h2>Learn more<\/h2>\n<p>To learn more about Microsoft Security solutions <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">visit our website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/04\/13\/how-far-have-we-come-the-evolution-of-securing-identities\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What are today\u2019s biggest identity challenges? Have I Been Pwned Founder Troy Hunt talks with Microsoft about the current state of identity.<br \/>\nThe post How far have we come? The evolution of securing identities appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":40429,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,9127],"class_list":["post-40428","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-voice-of-the-community"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How far have we come? The evolution of securing identities 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-far-have-we-come-the-evolution-of-securing-identities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How far have we come? The evolution of securing identities 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-far-have-we-come-the-evolution-of-securing-identities\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-13T18:00:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/how-far-have-we-come-the-evolution-of-securing-identities.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-far-have-we-come-the-evolution-of-securing-identities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-far-have-we-come-the-evolution-of-securing-identities\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How far have we come? The evolution of securing identities\",\"datePublished\":\"2021-04-13T18:00:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-far-have-we-come-the-evolution-of-securing-identities\\\/\"},\"wordCount\":1598,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-far-have-we-come-the-evolution-of-securing-identities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/how-far-have-we-come-the-evolution-of-securing-identities.png\",\"keywords\":[\"Cybersecurity\",\"Voice of the Community\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-far-have-we-come-the-evolution-of-securing-identities\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-far-have-we-come-the-evolution-of-securing-identities\\\/\",\"name\":\"How far have we come? The evolution of securing identities 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-far-have-we-come-the-evolution-of-securing-identities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-far-have-we-come-the-evolution-of-securing-identities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/how-far-have-we-come-the-evolution-of-securing-identities.png\",\"datePublished\":\"2021-04-13T18:00:22+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-far-have-we-come-the-evolution-of-securing-identities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-far-have-we-come-the-evolution-of-securing-identities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-far-have-we-come-the-evolution-of-securing-identities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/how-far-have-we-come-the-evolution-of-securing-identities.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/how-far-have-we-come-the-evolution-of-securing-identities.png\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-far-have-we-come-the-evolution-of-securing-identities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How far have we come? The evolution of securing identities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How far have we come? The evolution of securing identities 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-far-have-we-come-the-evolution-of-securing-identities\/","og_locale":"en_US","og_type":"article","og_title":"How far have we come? The evolution of securing identities 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-far-have-we-come-the-evolution-of-securing-identities\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-04-13T18:00:22+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/how-far-have-we-come-the-evolution-of-securing-identities.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-far-have-we-come-the-evolution-of-securing-identities\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-far-have-we-come-the-evolution-of-securing-identities\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How far have we come? The evolution of securing identities","datePublished":"2021-04-13T18:00:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-far-have-we-come-the-evolution-of-securing-identities\/"},"wordCount":1598,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-far-have-we-come-the-evolution-of-securing-identities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/how-far-have-we-come-the-evolution-of-securing-identities.png","keywords":["Cybersecurity","Voice of the Community"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-far-have-we-come-the-evolution-of-securing-identities\/","url":"https:\/\/www.threatshub.org\/blog\/how-far-have-we-come-the-evolution-of-securing-identities\/","name":"How far have we come? The evolution of securing identities 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-far-have-we-come-the-evolution-of-securing-identities\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-far-have-we-come-the-evolution-of-securing-identities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/how-far-have-we-come-the-evolution-of-securing-identities.png","datePublished":"2021-04-13T18:00:22+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-far-have-we-come-the-evolution-of-securing-identities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-far-have-we-come-the-evolution-of-securing-identities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-far-have-we-come-the-evolution-of-securing-identities\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/how-far-have-we-come-the-evolution-of-securing-identities.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/how-far-have-we-come-the-evolution-of-securing-identities.png","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-far-have-we-come-the-evolution-of-securing-identities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"How far have we come? The evolution of securing identities"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=40428"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40428\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/40429"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=40428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=40428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=40428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}