<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cyberinsight.co.za/blogs/tag/itdr/feed" rel="self" type="application/rss+xml"/><title>www.cyberinsight.co.za - Blog #ITDR</title><description>www.cyberinsight.co.za - Blog #ITDR</description><link>https://www.cyberinsight.co.za/blogs/tag/itdr</link><lastBuildDate>Mon, 04 May 2026 17:02:59 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Why Identity Has Become the New Cybersecurity Battleground]]></title><link>https://www.cyberinsight.co.za/blogs/post/why-identity-has-become-the-new-cybersecurity-battleground</link><description><![CDATA[<img align="left" hspace="5" src="https://www.cyberinsight.co.za/Blogs/Blog Images -2-.png"/>Identity is the new cybersecurity battleground. Discover how Sophos ITDR helps businesses detect misconfigurations, stop stolen credentials, and protect digital identities.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_qjT-e8YoQc25pjaXxnt1Tw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_3vPCFc_uT4uASH90vnQVBg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_YqOj1KuYQs6vURchSm0EcA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_MkNYrZw2-FPak9S6joTM_g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_MkNYrZw2-FPak9S6joTM_g"] .zpimage-container figure img { width: 1240px ; height: 734.81px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blogs/Blog%20Images%20-2-.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_8TYMYrrjZgRCyXKYtzrCLw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_8TYMYrrjZgRCyXKYtzrCLw"] div.zpspacer { height:9px; } @media (max-width: 768px) { div[data-element-id="elm_8TYMYrrjZgRCyXKYtzrCLw"] div.zpspacer { height:calc(9px / 3); } } </style><div class="zpspacer " data-height="9"></div>
</div><div data-element-id="elm_-1ikVoKHRjqbnT_yjV6kmg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-1ikVoKHRjqbnT_yjV6kmg"] h2.zpheading{ font-family:'Montserrat',sans-serif; font-weight:600; line-height:50px; } </style><h2
 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>How identity-based threats are reshaping cybersecurity and why proactive detection is now essential for every organisation.</span></h2></div>
<div data-element-id="elm_diAXqA_NQ024AgrHfinc-w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_diAXqA_NQ024AgrHfinc-w"].zpelem-text { color:#013A51 ; font-size:20px; margin-block-start:38px; } [data-element-id="elm_diAXqA_NQ024AgrHfinc-w"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p>For years, cybersecurity has focused on keeping the “bad guys” out — firewalls, antivirus tools, and endpoint protection have long been the backbone of defence.<br/> But today, the real front line isn’t at the perimeter anymore. It’s inside your organisation, hidden within the very <strong>identities</strong> that control access to your systems, data, and applications. Identity has become the new battleground.</p><p></p></div>
</div><div data-element-id="elm_1gxW_sSnhTLd8txrTlaNlg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_1gxW_sSnhTLd8txrTlaNlg"] div.zpspacer { height:17px; } @media (max-width: 768px) { div[data-element-id="elm_1gxW_sSnhTLd8txrTlaNlg"] div.zpspacer { height:calc(17px / 3); } } </style><div class="zpspacer " data-height="17"></div>
</div><div data-element-id="elm_LhZ8LbLre3OqhimYRVzRcA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span><strong>The Shift from Perimeter to Identity</strong></span></span></h3></div>
<div data-element-id="elm_BtQ6AG588gVHATp0-rw-ew" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_BtQ6AG588gVHATp0-rw-ew"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_BtQ6AG588gVHATp0-rw-ew"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p>As businesses move to hybrid and cloud environments, attackers have adapted. Instead of trying to break through network defences, they’re using <strong>stolen credentials</strong>, <strong>misconfigurations</strong>, and <strong>weak access controls</strong> to log in as legitimate users.</p><p>It’s a simple, effective, and frighteningly common tactic.</p></span></span><p></p><p></p></div>
</div><div data-element-id="elm_W3BgYusAGkUvuDBH1SEeQw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_W3BgYusAGkUvuDBH1SEeQw"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_W3BgYusAGkUvuDBH1SEeQw"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p>According to recent Sophos research,<br/><span><span></span></span></p><ul><li><strong>90% of organisations</strong> experienced at least one identity-related breach in the past year.</li><li><strong>95% of Microsoft Entra ID environments</strong> (formerly Azure AD) have at least one critical misconfiguration that could allow privilege escalation.</li></ul></span></span><span><span>These aren’t just statistics — they represent a fundamental change in how cyber risk operates.</span></span><br/><p></p><p></p><p></p></div>
</div><div data-element-id="elm_GUCU_s-aCq8nbVyQdZDZYA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_GUCU_s-aCq8nbVyQdZDZYA"] div.zpspacer { height:8px; } @media (max-width: 768px) { div[data-element-id="elm_GUCU_s-aCq8nbVyQdZDZYA"] div.zpspacer { height:calc(8px / 3); } } </style><div class="zpspacer " data-height="8"></div>
</div><div data-element-id="elm_OnWKqrm6WsfuydleDpzyBA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span><strong>Introducing Sophos Identity Threat Detection and Response (ITDR)</strong></span></span></h3></div>
<div data-element-id="elm_Ub1RmRGc7WQn8pbDjcA6rg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Ub1RmRGc7WQn8pbDjcA6rg"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_Ub1RmRGc7WQn8pbDjcA6rg"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p>At Cyber Insight, we’ve seen this trend accelerating across South Africa’s business landscape. That’s why we’re proud to integrate <strong><a href="https://www.sophos.com/en-us/products/identity-threat-detection-and-response?partner_referral_id=0013Z00001mQdpr&amp;partner_name=CYBER%2BINSIGHT%2B%28PTY%29%2BLTD%3Fpartner_referral_id=0013Z00001mQdpr&amp;partner_name=CYBER%2BINSIGHT%2B%28PTY%29%2BLTD" title="Sophos Identity Threat Detection and Response (ITDR)" rel="">Sophos Identity Threat Detection and Response (ITDR)</a></strong> into our managed security portfolio.</p><p>ITDR is a next-generation capability that continuously monitors your environment for <strong>identity risks, misconfigurations, and stolen credentials</strong>. It combines visibility with action — enabling organisations to detect anomalies, respond automatically, and benchmark their identity security posture over time.</p></span></span><p></p><p></p><p></p></div>
</div><div data-element-id="elm_L5cKJmU5pxEeUh-84oGfnw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_L5cKJmU5pxEeUh-84oGfnw"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_L5cKJmU5pxEeUh-84oGfnw"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p>In practical terms, that means:</p><ul><li><strong>Continuous scanning</strong> of Microsoft Entra ID to detect security gaps and over-privileged accounts.</li><li><strong>Dark web intelligence</strong> to alert you if employee credentials are being traded or leaked.</li><li><strong>Automated responses</strong>, such as account locking, password resets, and session termination.</li><li><strong>Risk scoring and trend analysis</strong> to track improvement and compliance with frameworks like CIS and NIST.</li></ul></span></span><p></p><p></p><p></p></div>
</div><div data-element-id="elm_AfKmcGfC016YqHyaNvikyQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_AfKmcGfC016YqHyaNvikyQ"] div.zpspacer { height:8px; } @media (max-width: 768px) { div[data-element-id="elm_AfKmcGfC016YqHyaNvikyQ"] div.zpspacer { height:calc(8px / 3); } } </style><div class="zpspacer " data-height="8"></div>
</div><div data-element-id="elm_Fz-v6TL2CtyU66JHc1bKQA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong><span style="font-weight:500;"><strong>Why This Matters for South African Businesses</strong></span></strong><strong></strong><span><span><strong></strong></span></span></h3></div>
<div data-element-id="elm_XfImlG9vmgadLttYIXyZ4w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XfImlG9vmgadLttYIXyZ4w"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_XfImlG9vmgadLttYIXyZ4w"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p></p><span><span>Identity-based attacks are on the rise in South Africa, particularly among <strong>financial institutions, professional services firms, and mid-sized enterprises</strong>.<br/> Cybercriminals know that once they compromise a legitimate account, they can quietly move through systems undetected — often for weeks or months — before deploying ransomware or stealing data.</span></span></span></span><br/><p></p><p></p><p></p></div>
</div><div data-element-id="elm_3oYlQRGzH7uvI5IGtkgKNA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3oYlQRGzH7uvI5IGtkgKNA"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_3oYlQRGzH7uvI5IGtkgKNA"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p></p><span><span><span><span><p>Unfortunately, many organisations still treat identity protection as a “check-box” exercise rather than a continuous, proactive discipline. This is the gap that <strong>ITDR closes</strong>.<br/><br/></p><p>By combining <strong>automated identity posture assessment</strong> with <strong>human-led response</strong> from Cyber Insight’s SOC analysts, we help businesses stay ahead of attacks that traditional tools often miss.</p></span></span></span></span></span></span><p></p><p></p><p></p></div>
</div><div data-element-id="elm_TCinY-i2SJz52Mt2DUaYOg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_TCinY-i2SJz52Mt2DUaYOg"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_TCinY-i2SJz52Mt2DUaYOg"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p></p><span><span><span><span><p></p><span><span><blockquote><p>“Cybersecurity is no longer just about malware and firewalls — it’s about securing the people and credentials that power your business,” says <strong>Deon Smal, CEO of Cyber Insight</strong>.<br/> “With Sophos ITDR, we can detect identity threats before they escalate and give our clients the visibility to take decisive action.”</p></blockquote></span></span></span></span></span></span></span></span><p></p><p></p><p></p></div>
</div><div data-element-id="elm_zaOLInYPnTRDjLgipG1BFw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_zaOLInYPnTRDjLgipG1BFw"] div.zpspacer { height:14px; } @media (max-width: 768px) { div[data-element-id="elm_zaOLInYPnTRDjLgipG1BFw"] div.zpspacer { height:calc(14px / 3); } } </style><div class="zpspacer " data-height="14"></div>
</div><div data-element-id="elm__UqHjTdDgkGnmNEM_Ij5Ew" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span><strong>A Smarter Way Forward</strong></span></span></h3></div>
<div data-element-id="elm_bsSI6cF_CYo7iHDtZL56FA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_bsSI6cF_CYo7iHDtZL56FA"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_bsSI6cF_CYo7iHDtZL56FA"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p></p><span><span><span><span><p></p><span><span><blockquote><p><span><span>Identity security is not a technology problem — it’s a visibility problem. You can’t defend what you can’t see.</span></span></p></blockquote></span></span></span></span></span></span></span></span><p></p><p></p><p></p></div>
</div><div data-element-id="elm_hpvxCiFYCJxo-tdOS6hqGg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_hpvxCiFYCJxo-tdOS6hqGg"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_hpvxCiFYCJxo-tdOS6hqGg"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p></p><span><span><span><span><p></p><span><span><blockquote><p><span><span></span></span></p></blockquote></span></span></span></span></span></span></span></span><span><span><p>Sophos ITDR gives South African organisations that missing layer of visibility and control. It transforms identity data into actionable insight, empowering teams to:</p><ul><li>Understand where risk lives in their environment.</li><li>Benchmark improvements over time.</li><li>Respond automatically when suspicious behaviour is detected.<br/><br/></li></ul><p>By integrating ITDR into our managed detection and response service, <strong>Cyber Insight delivers a unified approach to security</strong> — one that connects identity, endpoint, and network telemetry into a single, intelligent defence model.</p></span></span><p></p><p></p><p></p></div>
</div><div data-element-id="elm_DGYsYAl7C75ZmRtqhXgnng" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_DGYsYAl7C75ZmRtqhXgnng"] div.zpspacer { height:21px; } @media (max-width: 768px) { div[data-element-id="elm_DGYsYAl7C75ZmRtqhXgnng"] div.zpspacer { height:calc(21px / 3); } } </style><div class="zpspacer " data-height="21"></div>
</div><div data-element-id="elm_P8hrpm_Nvj4af5NxTq1W_A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span><strong>Local Experts. Global Intelligence. Trusted Protection.</strong></span></span></h3></div>
<div data-element-id="elm_82E0kM0HYC9bvt-mXTe2MQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_82E0kM0HYC9bvt-mXTe2MQ"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_82E0kM0HYC9bvt-mXTe2MQ"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p></p><span><span><span><span><p></p><span><span><blockquote><p><span><span></span></span></p></blockquote></span></span></span></span></span></span></span></span><span><span><p></p><span><span><p>At Cyber Insight, our mission is simple: to help organisations build <strong>resilience through clarity</strong>.<br/><br/></p><p>We combine world-class technology from partners like <strong>Sophos</strong> with local expertise to ensure that South African businesses — from SMEs to large enterprises — can operate confidently in a rapidly changing threat landscape.</p><p><br/>Because in cybersecurity, visibility is power. And with Sophos ITDR, that visibility starts with identity.</p></span></span></span></span><p></p><p></p><p></p></div>
</div><div data-element-id="elm_oJL5vjTONmsUiYj4olPnYQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_oJL5vjTONmsUiYj4olPnYQ"] div.zpspacer { height:11px; } @media (max-width: 768px) { div[data-element-id="elm_oJL5vjTONmsUiYj4olPnYQ"] div.zpspacer { height:calc(11px / 3); } } </style><div class="zpspacer " data-height="11"></div>
</div><div data-element-id="elm_d0eRBb9HqDYIOKRpgW2w_A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span><strong>Want to learn more?</strong></span></span></h3></div>
<div data-element-id="elm_JQiSmLHMluNFwplu3G0dcg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JQiSmLHMluNFwplu3G0dcg"].zpelem-text { color:#013A51 ; font-size:20px; } [data-element-id="elm_JQiSmLHMluNFwplu3G0dcg"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#013A51 ; font-size:20px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span></span></span></p><p></p><span><span><p></p></span></span><span><span><p></p><span><span><span><span><p></p><span><span><blockquote><p><span><span></span></span></p></blockquote></span></span></span></span></span></span></span></span><span><span><p></p><span><span><p></p><span><span>Contact us at <strong>info@cyberinsight.co.za</strong> to schedule a consultation.</span></span></span></span></span></span><br/><p></p><p></p><p></p></div>
</div><div data-element-id="elm_XMOIf63mSHCl3oi6GCh5TA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:info@cyberinsight.co.za"><span class="zpbutton-content">Contact us</span></a></div>
</div><div data-element-id="elm_5bfu_tjPRByHmcwdyd1jRg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_5bfu_tjPRByHmcwdyd1jRg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_5bfu_tjPRByHmcwdyd1jRg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 21 Nov 2025 12:34:57 +0000</pubDate></item></channel></rss>