As organizations mark Identity Management Day, security leaders are increasingly raising concerns about the growing risks associated with digital identities. Notably, experts from Delinea, WatchGuard Technologies, Ping Identity, and ClickHouse emphasize that cyber threats are rapidly shifting away from traditional perimeter defenses toward identity-centric vulnerabilities.
To begin with, Delinea CEO Art Gilliland highlighted that non-human identities—especially AI agents—are emerging as major risk factors. While many organizations claim readiness for AI adoption, they still struggle with identity governance for these systems. As a result, this gap introduces hidden vulnerabilities across enterprise environments.
“Identity doesn’t stop at people. Non-human identities, particularly AI agents, are quickly becoming one of the biggest sources of enterprise risk. Despite 83% of Australian organisations claiming they’re ready for AI-driven automation at scale, 40% admit their identity governance for AI systems falls short. The problem is relatively simple but often overlooked: teams are still treating AI agents as tools, when they actually behave like privileged users. This creates the ‘AI security paradox’, where organisations are scaling their AI initiatives faster than they control which identities get access to what. Dangerous blind spots can form as a result, hiding unchecked privilege, quiet access paths, and little accountability for actions. The pressure to move fast on AI is real, but so is the need to lock down identities. As AI agents continue to multiply across enterprise environments, identity can’t be viewed as just another part of security; it must be treated as the overarching control plane,” said Art Gilliland, Chief Executive Officer, Delinea.
Furthermore, attackers are changing their tactics. According to WatchGuard Technologies, cybercriminals now prefer logging in with stolen credentials rather than exploiting software vulnerabilities. Consequently, this trend makes traditional defenses less effective.
“Most cybercriminals don’t hack into systems anymore, they simply log in. Attackers are increasingly exploiting identity to gain access, using stolen credentials, encrypted channels and legitimate tools to blend into trusted environments. Once inside, they move laterally across systems without raising alarms, rendering traditional defences ineffective. As highlighted in WatchGuard’s Internet Security Report, there has been a 1,548% surge in new, unique malware alongside a rise in threats designed to evade detection. With 96% of malware now delivered over encrypted channels, visibility is shrinking while attacker capability continues to grow.”
“This Identity Management Day, organisations need to shift the conversation from access management to identity risk management. That means continuously assessing behaviour, context and intent, and connecting identity with endpoint and network signals to detect compromise earlier. In an environment where attackers can appear indistinguishable from legitimate users, identity is no longer just part of the attack chain, it is where it begins and where it must be controlled,” said Anthony Daniel, Managing Director, Australia, New Zealand and the Pacific Islands, WatchGuard Technologies.
At the same time, Ping Identity CIO John Cannava stressed the importance of continuous trust models. He explained that traditional login-based security is no longer sufficient in a world dominated by AI and agentic systems.
“From an IT leadership perspective, Identity Management Day takes on new urgency this year as both individuals and organisations are managing human identities while also governing AI as it takes on increasingly agentic roles. The impact AI will have on identity will likely be far greater than we anticipate, which means our approach to security has to evolve in lockstep.”
“In this new reality, the login is no longer the primary security boundary – access must be continuously evaluated and enforced. In agentic systems, risk doesn’t end at sign-in; it evolves dynamically at runtime as users and systems interact. Identity can no longer be verified once and trusted indefinitely. It must be continuously evaluated at every high-impact action.”
“That’s why approaches like zero trust and decentralized identity are becoming critical to reducing risk while still enabling the business to move quickly. As AI-driven attacks increasingly target centralised data and try to imitate legitimate users, organisations need to move away from single points of failure and verify every access request in real time, no matter who or what is behind it. This requires rethinking identity across both workforce and customer environments.”
“As the way we work continues to change, the focus has to be on securing the workforce, maintaining customer trust, and delivering digital experiences that are both seamless and secure. The future of identity will depend on how well we adapt to this more dynamic, continuous model of trust,” said John Cannava, Chief Information Officer, Ping Identity.
Meanwhile, ClickHouse’s APAC sales leader Paul Davis pointed to industry shifts and the growing dominance of machine identities. He noted that identity security has evolved into a standalone discipline, driven by increasing AI fraud and credential-based attacks.
“The identity security market has matured significantly over the past year, with Palo Alto Networks completing its $25 billion acquisition of CyberArk and CrowdStrike picking up SGNL for $740 million, which signals that the industry now treats identity as a standalone discipline rather than a feature within a broader security stack. The landscape driving that shift is clear: machine identities vastly outnumber human ones, credential-based attacks have overtaken traditional malware as the preferred method of entry, and AI-generated identity fraud is already playing out at scale, as we saw recently where fabricated documents were allegedly used to secure roughly a billion dollars in fraudulent loans.”
“The emergence of agentic identity security adds another dimension to all of this. AI agents are now accessing systems, making decisions, and acting on behalf of organisations, and the identity conversation has expanded from how we authenticate users to how we ensure an agent gets precisely the access it needs and nothing more, while continuously verifying it stays within those boundaries. Doing that well requires real-time correlation of identity events across your SSO provider, cloud IAM, application logs, and privileged access tools at a speed and scale that most traditional SIEM platforms weren’t designed to handle, which is where a platform like ClickHouse comes in.”
“As a high-performance data platform powering workloads across real-time analytics, data warehousing, observability, and AI/ML, ClickHouse gives teams the analytical infrastructure to retain every identity event at full granularity and query it in real time. On our own cloud platform we support enterprise SSO with SAML and just-in-time provisioning, granular role-based access at every layer, and integrations with providers like Okta, Azure AD, Google Workspace, and Duo, and through our recent acquisition of Langfuse, the open-source LLM engineering platform, we also provide observability and evaluation for agentic systems so teams can monitor whether their AI agents are operating within the access boundaries they’ve been set. Protecting identities in 2026 means protecting every identity: human, machine…and agent,” said Paul Davis, Area Vice President Sales – APAC, ClickHouse.
In conclusion, industry leaders agree that identity now forms the core of both cyberattacks and defense strategies. Therefore, organizations must prioritize identity governance across human and non-human entities to stay secure in an AI-driven world.
Recommended Cyber Technology News:
- GitHub, Jira Emails Exploited for Stealth Phishing Attacks
- Oracle Enhances Aconex to Boost Project Visibility and Compliance
- MSBuild Abuse Enables Stealthy Fileless Windows Attacks
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading




