By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: How organisations are using personal devices to safeguard identity
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Cybersecurity > How organisations are using personal devices to safeguard identity
CybersecurityEnterprise

How organisations are using personal devices to safeguard identity

Techgoondu
Last updated: May 7, 2026 at 11:10 AM
Techgoondu
Published: May 7, 2026
7 Min Read

In association with HID

In many modern offices, a curious security gap exists. An employee might use a high-security encrypted badge to enter a building, yet minutes later, log into a critical corporate database using only a password and a six-digit code sent via SMS.

While the physical perimeter is locked down, the digital gateway remains reliant on a foundation that is increasingly easy for hackers to crack.

This disconnect signals a fundamental crisis in the traditional security frameworks that organisations have relied on for decades. The long-standing strategy of building high walls around a network to protect identity is failing.

ILLUSTRATION: Dan Nelson via Unsplash

As the industry moves through 2026, it has become clear that attackers are no longer “breaking in” to systems; they are simply logging in using stolen credentials.

As industry analysts have noted, identity has moved to the heart of the digital era, underpinning everything from employee productivity to zero-trust principles.

Today, identity security areas – specifically identity threat detection and response (ITDR) and strong authentication – have emerged as the top priorities for organisations over the next 18 months.

This focus is driven by the reality that hybrid and remote work have expanded the attack surface, leaving network-stored credentials vulnerable to replay and social engineering.

To secure the modern enterprise, organisations must reroute their identity strategy, moving identity off the vulnerable network layer and anchoring it firmly to the physical device, said Edwardcher Monreal, principal solutions architect at HID, an identity security company.

This “device-bound” approach represents a critical evolution in authentication, he told Techgoondu at the recent Black Hat APAC 2026 conference in Singapore.

By making an identity non-exportable and bound to a specific piece of hardware – such as a laptop, a smartphone, or a dedicated security key – the attacker’s job becomes exponentially more difficult, he argued.

This is because they could no longer simply steal a string of text but must obtain physical possession of the user’s hardware, he explained.

Edwardcher Monreal, principal solutions architect at HID. PHOTO: HID

A primary driver of current vulnerability is the fragmented way organisations handle security. Historically, physical security teams and digital IT teams have operated in silos.

This fragmentation creates blind spots. While an employee might use a secure badge for the lobby, their digital access often relies on outdated multi-factor authentication (MFA) methods that are increasingly targeted by modern phishing kits and session-hijacking tools.

In recent years, the FIDO (Fast Identity Online) standard is the engine driving the transformation toward more secure methods.

While high-level security was once reserved for organisations that could afford the complexity of a full Public Key Infrastructure (PKI), the industry is now seeing the rise of what Monreal describes as “PKI-lite” through the adoption of passkeys.

Passkeys are now integrated into the major operating systems of Windows, iOS, and Android. Unlike traditional passwords, passkeys are stored within a device’s secure element – a dedicated, tamper-resistant hardware chip.

When a user authenticates, the device uses a private key to sign a challenge from a specific website or application. Because this signature is unique to both the device and the website address, it provides inherent protection against phishing.

The convergence of physical and digital security is a measurable trend. According to a recent HID study, 75 per cent of organisations have already deployed or are actively evaluating converged identity solutions.

The underlying logic is that the “new perimeter” exists wherever the user and the device are located.

In a converged environment, physical and digital signals work together to increase certainty. For example, if a digital account attempts to log in to a workstation from an office location, but the physical security system shows the employee never badged into the building, the system can automatically trigger an alert or block the attempt. This synergy turns the physical office into an active component of digital defence.

Managing this life cycle also increases efficiency for IT departments. In a device-bound environment, if an employee loses a phone or laptop, IT simply revokes trust for that specific device. Once deactivated, the identity held on that device is neutralised, regardless of whether an attacker has the PIN.

Monreal suggests a tactical, phased approach to rerouting identity rather than a total overhaul. The first step involves identifying high-value targets, such as IT administrators, executives with access to sensitive financial data, and personnel involved in payroll or third-party vendor payments.

These individuals represent the highest risk and are the priority for moving to device-bound, phishing-resistant authentication, he suggested.

As the industry moves through 2026, the shift away from network-centric security is becoming essential. The path forward requires a fundamental change in how trust is established, he noted.

By moving identity off the network and binding it to physical devices, organisations can close the gaps that attackers have exploited for years, he added.

“If an identity can be moved or reused, it can be bypassed,” he explained. “By rerouting our focus back to device-bound trust, we ensure that identity cannot be stolen because it never leaves the hardware in the user’s hand.”

He added: “In this new landscape, the most secure move is to stop defending a perimeter that no longer exists and start building a foundation of trust at the hardware level.”

Decathlon opens “data lab” in Singapore, partners SportSG to use data to boost sports programmes
New Oracle AI centre in Singapore promises to cut through hype
SAP will not contest liability of TomorrowNow in Oracle lawsuit
Google Distributed Cloud extends company’s technology stack to the edge, data centres
No immediate, mass exploits but Log4Shell threat to remain for years: Sophos
TAGGED:Black Hat APACcredential theftEdwardcher MonrealHIDidentity securityphysical accessphysical securitysponsored

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Previous Article Singapore tells banks, key infrastructure operators to beef up defence against frontier AI models
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Singapore tells banks, key infrastructure operators to beef up defence against frontier AI models
Cybersecurity Enterprise Software
May 5, 2026
Samsung Galaxy A57 review: Slim midrange phone hits the right notes
Cellphones Mobile
May 2, 2026
Q&A: Singaporeans use wearables to track sleep but can rest better, says Resmed
Internet Mobile
April 30, 2026
Personal AI use ups AI trust in the workplace: Salesforce study
Enterprise Software
April 29, 2026

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.


banner							
banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON

banner							
banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT

banner							
banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2026 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Follow Us!
Hear the signal from the noise. Essential tech analysis from our Reality Check newsletter.

Zero spam. Unsubscribe at any time.

Loading Comments...

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?