Identity takes centre stage as AI, machine identities redefine enterprise security #AI


Identity Management Day 2026 highlights how credential abuse, AI agents, and non-human identities are reshaping cyber risk and forcing organisations to rethink access control.

Identity Management Day, observed annually on April 14,  has evolved into a critical moment for organisations to reassess how they secure the very foundation of digital trust: identity. Originally launched to raise awareness around identity governance, access control, and cybersecurity best practices, the day was established by industry leaders to address one of the most persistent gaps in enterprise security: mismanaged identities and excessive access privileges.

In 2026, its relevance has expanded significantly. Identity is no longer limited to human users; it now encompasses a rapidly growing universe of machine identities, AI agents, and autonomous systems that operate continuously and at scale. This shift has transformed identity into the central control plane of modern enterprises—linking users, applications, data, and infrastructure across cloud, SaaS, and hybrid environments.

Industry consensus underscores a clear reality: attackers are no longer primarily breaking into systems—they are logging in. Credential abuse, phishing, and the exploitation of privileged access have become dominant attack vectors, often enabling large-scale breaches from a single compromised identity. At the same time, organisations are accelerating AI adoption faster than they can govern access, creating what experts describe as an “AI identity paradox.”

Identity Management Day serves as a vital reminder that security must move beyond static, human-centric models. Principles such as least privilege, just-in-time access, continuous verification, and behavioural context are no longer optional—they are essential. More importantly, they must be extended to non-human identities with the same rigour as human users.

Ultimately, Identity Management Day 2026 is not just about awareness—it is about redefining accountability in a digital world where trust is constantly tested. In an era where identities outnumber humans exponentially and operate at machine speed, securing identity is no longer a function of IT—it is the cornerstone of resilience, continuity, and business survival.

TahawulTech.com spoke with leading industry experts across cybersecurity and identity management, capturing insights from organisations at the forefront of securing digital ecosystems. The collective views highlight a clear and urgent shift: identity is no longer just an IT function, but the core control layer of modern enterprise security. From the rise of AI-driven identities and autonomous agents to the growing sophistication of credential-based attacks, these experts underscore the need for organisations to rethink how identity is governed, monitored, and protected in an increasingly complex threat environment. 

Morey Haber,  Santiago Pontiroli, Vibin Shaju, and Mortada Ayad.

Morey Haber, Chief Security Advisor, BeyondTrust 

 Identity Management Day is no longer solely about humans and the accounts that represent our digital personas. It has evolved into managing identities that do not sleep, have no morals, ethics, or understand risk in the form of fear, pain, or anxiety. AI agents, and complete systems that form Agentic AI, introduce autonomous decision making tied directly to privilege identities and accounts operating on behalf of human users. Without privileged centric identity controls, these AI agents represent an emerging risk surface that can be operated and compromised at machine speed.  Least privilege, just in time access, ephemeral secrets, and continuous verification are no longer just best practices for humans; they must be incorporated into the workflows for every agentic AI implementation. They are absolutely essential requirements, based on secure by design principles.  

“Identity Management Day gives us a perfect opportunity to raise awareness of this and ensure that every organisation considers AI agent identity security as a part of current and future deployments.”

 If you do not govern non-human identities, including agentic AI, with the same rigour as human privileged users, you are not managing identities. You are delegating trust without accountability, and the risks will become breaches if not managed from the start. 

Mortada Ayad, VP – META, Delinea
Identity Management Day is a timely moment to reflect on a space that is at a critical inflection point. Today’s enterprise environments are awash with AI agents and other non-human identities. These entities are always on, highly capable, and deeply embedded in critical workflows. Yet despite this, they continue to be treated as tools, rather than the privileged identities they effectively are. This is the ‘AI security paradox’: organisations are scaling AI adoption faster than they can govern who, or what, has access to what. We cannot, and should not, put AI back in the bottle. But we must evolve identity management beyond static, standing access models towards approaches that are dynamic, contextual, and responsive. Access decisions must account not just for identity, but for behaviour.

“If we continue to rely on frameworks designed for humans alone, they will increasingly fail in the reality where machines outnumber humans by over 40,000 to 1.”

 Vibin Shaju, Vice President, EMEA Solutions Engineering, Trellix
 Identity has become the defining control point of the cloud era. As organisations expand across cloud, SaaS, and hybrid environments, identity is now what connects people, applications, and data, making it central to how modern businesses operate and scale. Insights from Trellix Threat Research show that attackers are increasingly targeting this layer, not by breaking systems, but by exploiting trust, focusing on credentials, access pathways, and high-value cloud accounts. Identity-based incidents can scale massively from a single user compromise, exposing millions of records. This reflects a broader shift in which the misuse of legitimate access can be just as impactful as traditional breaches, and are often harder to detect. At the same time, leaders are being asked to balance speed, openness, and security in environments where identity is constantly in motion. A proactive cybersecurity strategy is successful here. Trellix brings together identity signals across endpoint, cloud, email, and network for a unified view of risk, applying AI and threat intelligence across the dataset, so organisations can better identify abnormal behaviour, detect misuse of access, and respond faster when trust is compromised. 

“On Identity Security Day, the message is clear: identity is no longer just about managing access; it is fundamental to trust, resilience, and continuity.” 

 Santiago Pontiroli, Lead TRU Researcher at Acronis
Identity has quietly become the easiest way in for attackers. In 2025, more than half of attacks against service providers started with phishing, and instead of breaking systems, attackers are increasingly logging in using stolen or bought access. This shift is visible across major campaigns where ransomware groups combined vulnerabilities with credential abuse to steal data at scale. 

At the same time, a full underground economy has formed around identity. Access brokers are selling VPN, RDP, and corporate credentials harvested by information stealers such as Lumma and RedLine. These stealers quietly collect passwords, cookies, and session tokens, which are then resold to ransomware groups as ready-made entry points. Incidents like the Handala hack show how identity compromise is no longer just the first step, but the core of the attack itself. 

As we continue through 2026, this trend is accelerating, with attackers targeting SaaS admin accounts and even machine identities, while using AI to scale phishing and impersonation.

“Identity has become the primary attack surface, and defending today is no longer about protecting the perimeter alone, but continuously verifying who and what is accessing your systems.”

Jay Reddy and Victor Garcia.

Jay Reddy, head of growth, ManageEngine
The identity landscape has outgrown what static models were built to secure. Identity risk is now continuous, expanding and increasingly autonomous. It sits at the center of every security decision an organisation makes. The way we manage identities has evolved from a perimeter-bound discipline into an intelligent, context-aware fabric that must synthesise risk signals, behavioral patterns, and business context in real time.

Non-human identities (NHIs) and AI agents proliferating across organisations faster than governance models can account for, has led to the rise of ungoverned identities with legitimate credentials, operating at machine speed inside the environment. The identity intelligence deficit we face today is not just a shortage of skilled professionals. It is the growing gap between the pace at which AI agents operate autonomously and governance frameworks that were built around human behavior.

Every AI agent must be treated as a distinct identity and tied to an accountable human. The principles that define mature identity programs, least privilege, just-in-time access, and zero trust remain the foundation. But they must now extend systematically beyond human identities to every service account, certificate, token and API in the environment, subject to continuous monitoring, access reviews, and time-bound credentials.

“The questions of “Where are my identities? What can they access? What should they be permitted to do?” remain unchanged. The ability to answer that continuously, across every identity in the environment, is now a defining capability for resilience.”

Victor Garcia, Field CISO Associate at Sophos
The key takeaway is clear: identity is now the primary security perimeter. Attackers are no longer breaking in—they are logging in, as mentioned in the report “who needs CVEs and exploits to get in when you have got passwords?”. When identity is compromised, trust is automatically granted, making identity protection the foundation of modern cybersecurity. During reported breaches due to credential compromise, credentials were not stolen once they were reused everywhere

What makes this shift more critical is how invisible these attacks have become. With stolen credentials and authentication abuse, malicious activity often looks like normal user behavior. This means organisations must move beyond basic login controls and adopt continuous identity verification based on context, behavior, and risk, moving toward a more preventive approach: monitoring user fingerprints, removing dormant accounts, conducting posture checks, and monitoring for leaked credentials on the deep web and dark web.

Speed is also a defining factor. Attackers can escalate privileges and target core identity systems within hours, leaving little room for delayed response.

“Strong identity controls—like least privilege, rapid session revocation, and tight access governance—are essential to contain threats before they spread.”

Identity Management Day also highlights a persistent gap: identity controls are often deployed but not fully enforced. Inconsistent MFA and weak privileged access management continue to create avoidable risk. Effective identity security requires full coverage, strong authentication methods, and disciplined execution.

Ultimately, identity is the control plane of cybersecurity. Organisations that prioritize resilient identity systems and real-time visibility will lead in defense. Those that don’t will continue to face breaches that are quiet, fast, and difficult to detect.

 





Click Here For The Original Source.

——————————————————–

..........

.

.

National Cyber Security

FREE
VIEW