{"id":10685,"date":"2026-01-12T03:49:06","date_gmt":"2026-01-12T03:49:06","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=10685"},"modified":"2026-01-12T03:49:06","modified_gmt":"2026-01-12T03:49:06","slug":"lack-of-mfa-retains-fueling-cloud-information-breaches","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=10685","title":{"rendered":"Lack of MFA Retains Fueling Cloud Information Breaches"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"generic-article\">\n<p class=\"text-muted\">\n                                            <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/artificial-intelligence-machine-learning-c-469\" id=\"asset_topic_1_1\">Synthetic Intelligence &amp; Machine Studying<\/a><br \/>\n                                                    ,<br \/>\n                                                            <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/multi-factor-risk-based-authentication-c-448\" id=\"asset_topic_1_2\">Multi-factor &amp; Danger-based Authentication<\/a><br \/>\n                                                    ,<br \/>\n                                                            <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/next-generation-technologies-secure-development-c-467\" id=\"asset_topic_1_3\">Subsequent-Technology Applied sciences &amp; Safe Improvement<\/a>\n                                                                                                                                            <\/p>\n<p>                    <span class=\"article-sub-title\">Additionally: Turning AI Information Into AI Protection, Autonomous Border Patrol Robots<\/span><br \/>\n                <span class=\"article-byline\"><br \/>\n                                                <a rel=\"nofollow\" target=\"_blank\" class=\"author-link\" href=\"https:\/\/www.bankinfosecurity.com\/authors\/anna-delaney-i-3368\">Anna Delaney<\/a> (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.twitter.com\/annamadeline\"><i class=\"fa fa-twitter\"\/>annamadeline<\/a>)                                                    \u2022<br \/>\n                        <span class=\"text-nowrap\">January 9, 2026<\/span> \u00a0 \u00a0 <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/ismg-editors-lack-mfa-keeps-fueling-cloud-data-breaches-a-30488#disqus_thread\"\/><\/span><\/p>\n<figure>\n                <img decoding=\"async\" src=\"https:\/\/ismg-cdn.nyc3.cdn.digitaloceanspaces.com\/articles\/ismg-editors-lack-mfa-keeps-fueling-cloud-data-breaches-image_large-3-a-30488.jpg\" alt=\"ISMG Editors: Lack of MFA Keeps Fueling Cloud Data Breaches\" class=\"img-responsive hidden\"\/><br \/>\n                            <\/figure>\n<figure><figcaption class=\"m-top-neg-10\">Clockwise, from prime left: Anna Delaney, Mathew Schwartz, Rashmi Ramesh and Tony Morbin<\/figcaption><\/figure>\n<p>On this week&#8217;s panel, 4 ISMG editors mentioned how primary safety failures are nonetheless opening the door to main breaches, how researchers are rethinking knowledge safety within the age of AI and the implications of robots with synthetic intelligence patrolling nationwide borders.<\/p>\n<p><b>See Additionally:<\/b> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/ai-browsers-new-trojan-horse-a-30258?rf=RAM_SeeAlso\">AI Browsers: the New Trojan Horse?<\/a><\/p>\n<figure>\n<p>The panelists &#8211; Anna Delaney, government director, productions; Mathew Schwartz, government editor, DataBreachToday and Europe; Rashmi Ramesh, senior affiliate editor; and Tony Morbin, government information editor, EU &#8211; mentioned:<\/p>\n<ul>\n<li>How the dearth of enforced multifactor authentication mixed with information-stealing malware are serving to attackers are <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/missing-mfa-strikes-again-hacker-hits-collaboration-tools-a-30452\">exploit<\/a> cloud collaboration companies, resulting in large-scale knowledge breaches that would have been prevented with primary safety controls;<\/li>\n<li>A brand new AI safety <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/poison-pill-defense-protects-proprietary-ai-data-from-theft-a-30461\">protection<\/a> that intentionally poisons information graphs with plausible false knowledge in order that, if stolen, the information can be ineffective to attackers whereas remaining absolutely correct for approved customers;<\/li>\n<li>The safety, security and governance dangers of deploying autonomous AI robots in public areas, utilizing China\u2019s use of border patrol robots for instance of how failures or compromises may result in actual bodily hurt if not handled as safety-critical infrastructure.<\/li>\n<\/ul>\n<p>The ISMG Editors&#8217; Panel runs weekly. Do not miss our earlier installments, together with the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/ismg-editors-reflections-on-cybersecurity-in-2025-a-30396\">Dec. 26<\/a> version on cybersecurity tales in 2025 and the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/ismg-editors-how-ai-reshaping-cybersecurity-strategy-a-30430\">Jan. 2<\/a> version on how AI is reshaping cybersecurity technique.<\/p>\n<\/figure>\n<\/div>\n<p><template id="1O0LOFB8wosCrJ3lDSVK"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Synthetic Intelligence &amp; Machine Studying , Multi-factor &amp; Danger-based Authentication , Subsequent-Technology Applied sciences &amp; Safe Improvement Additionally: Turning AI Information Into AI Protection, Autonomous Border Patrol Robots Anna Delaney (annamadeline) \u2022 January 9, 2026 \u00a0 \u00a0 Clockwise, from prime left: Anna Delaney, Mathew Schwartz, Rashmi Ramesh and Tony Morbin On this week&#8217;s panel, 4 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":10687,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[5449,234,157,6831,7357,118],"class_list":["post-10685","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-breaches","tag-cloud","tag-data","tag-fueling","tag-lack","tag-mfa"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/10685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10685"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/10685\/revisions"}],"predecessor-version":[{"id":10686,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/10685\/revisions\/10686"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/10687"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 16:52:43 UTC -->