Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and dispersed work models that multiply risk vectors. A username and password, even validated with MFA, no longer guarantee on their own that the connection is secure.
The problem is not only that authentication fails, but that the signals that validate a session are rarely reassessed during their useful life. A session token issued after overcoming MFA can be intercepted and reused by an attacker; from the service perspective, that token is indistinguishable from the legitimate one. This is why the Zero Trust framework proposed by institutions such as NIST also recommends assessing the position of the device when making access decisions: NIST SP 800-207.

In practice, many organizations remain in the timely validation: verified identity, MFA OK and session started until the end of the token. This approach leaves a post-authentication blind area where changes in endpoint - deactivation of antivirus control, pending patches, unauthorized hardware - can turn an initially legitimate session into an entry door for the attacker.
The empirical evidence reinforces the urgency: incident reports continue to point to stolen credentials as a key factor in a significant proportion of gaps. Verizon, in his annual report, shows how identity abuse continues to dominate the attack surface and why it is necessary to complement identity verification with real-time contextual controls: Verizon DBIR.
The practical solution that goes beyond timely verification is to unite identity and health of the device in continuous access decisions. Continuous verification of the device requires access to depend not only on who is authenticated, but on what is authenticated and in what operational status this device is. Technologies such as continuous access assessment (Continuous Access Evaluation) allow you to revoke or adjust privileges while the session is active: more about CAE.
This has specific implications for security teams: access policies must be able to distinguish between a managed corporate endpoint and a personal or committed endpoint, must integrate EDR / MDM signals with the identity system, and must apply proportional controls that avoid unnecessary blocks without giving up security. Attacking this problem requires integration between identity and endpoint, as well as automation to react in real time.

Not everything is technological: there are operational costs and challenges. Continuous monitoring of device status raises privacy / legal concerns in BYOD environments and requires clear consent processes and telemetry limits. In addition, many legacy applications do not support modern session control mechanisms, which requires hybrid strategies that include network segmentation, microsegmentation and reduced use of unsafe protocols.
For security teams that need to prioritize actions today, practical recommendations include inventing critical applications and their access vectors, deploying continuous testing pilot tests in a controlled subset of users, requiring phishing-resistant authenticators (FIDO2 / WebAuthn) where possible, shortening the life of privileged tokens and connecting EDR / MDM signals to the access decision engine to enable automated responses to endpoint position degradation.
In short, identity is still necessary but no longer sufficient. Modern defense requires that the decision to allow or limit access combine who, how and from what the user is connected, and that that decision be reevaluated throughout the session. Those who adopt a model that integrates identity and continuous verification of the device will significantly reduce the operational value of stolen credentials and intercepted tokens, making life difficult for professional attackers.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...

PinTheft the public explosion that could give you root on Arch Linux
A new public explosion has brought to the surface again the fragility of the Linux privilege model: the V12 Security team named the failure as PinTheft and published a concept t...