Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

Agentic AI opens door to new ID challenges: Report

Research released Thursday by Rubrik Zero Labs finds that the AI wave, and in particular agentic AI, has created a “troubling gap between the expanding identity attack surface and organizations’ ability to recover from resulting compromises.”

According to the report, Identity Crisis: Understanding & Building Resilience Against Identity-Driven Threats, the result is a surge of both non-human identities (NHIs) and agentic identities.

Key findings revealed:

  • 89% of organizations have “fully or partially incorporated AI agents into their identity infrastructure, and an additional 10% have plans to.”
  • Of those polled, 58% estimate that, in the next 12 months, half or more of the cyberattacks they must deal with will be “driven by agentic AI.”
  • Industry reports contend that NHIs now outnumber human users by 82-1.

In addition, a release from Rubrik states, as organizations integrate agents into their workflows, the increase in NHIs will continue to outpace the growth of human identities,  and securing them “will become as essential — if not more so — as securing human identities.”

Furthermore, authors of the report state, “as traditional network boundaries have dissolved amid cloud migrations, remote work adoption, and now agentic AI, identity is no longer merely a control layer. It has become the primary attack surface, which threat actors weaponize to gain access to IT environments and ‘live off of the land’ over the course of an attack.”

The overwhelming majority of today’s breaches, they write, are predicated on exploiting trust and valid credentials rather than circumventing network defenses.

‘Under-the-radar crisis exists

Kavitha Mariappan, chief transformation officer at Rubrik, said, “the rise of identity-driven attacks is changing the face of cyber defense. Managing identities in the era of AI has become a complex endeavor, especially with the labyrinth of NHIs. We have an under-the-radar crisis on our hands where a single compromised credential can grant full access to an organization’s most sensitive data.”

She added, “comprehensive Identity Resilience is absolutely critical to cyber recovery in this new landscape.”

The research was prompted, she said in an email to CSOonline, because “the cyber defense landscape has fundamentally changed, creating a significant gap between the expanding identity attack surface and an organization’s ability to recover [from an attack]. As traditional network boundaries have dissolved due to cloud migration, remote work, and the accelerating adoption of agentic AI, identity has become a primary vulnerability.”

Threat actors “are overwhelmingly exploiting trusted and valid credentials to log in, not break in,” Mariappan explained. “These attacks are further complicated by the labyrinth of non-human identities, like API keys and AI agents, which are surging across the enterprise and are proving difficult to manage. Unlike with human identities, these NHIs can be difficult to revoke and often slip through the cracks, leading to poor lifecycle governance.”

David Shipley, head of Canadian security awareness training provider firm Beauceron Security, said he agrees with the report’s findings for a key reason: “[While] phishing and social engineering overall are where attacks start, identity and access management (IAM) practices are where the fire gets roaring.”

Organizations, he said, “need modern approaches to IAM and employee cyber education and engagement. The employee education doesn’t just help them spot and stop threats, you can help them understand why good IAM processing technology is required.”

He pointed out, “[there is] a reason why identity and access management is the foundation of a security program. When it’s done poorly, the impacts reverberate throughout an organization during an attack.”

Shipley said that he often tells clients, “IAM is the bottom of the cyber equivalent of Maslow’s hierarchy of needs. Where humans need food and shelter to survive, digital systems need strong IAM practices to survive.”

“In our work around the world, we’ve seen that as organizations get larger and more complex, it’s far more likely they have huge issues in identity management,” he said. “This isn’t the kind of problem that technology alone can fix, regardless of the vendor. It takes understanding people, process, culture, and technology.”

Agentic AI ‘like a stick of dynamite thrown into a fishpond’

For example, said Shipley, “it doesn’t matter what AI-powered IAM tool you have if you allow people to bypass processes to grant, remove, or change access because the process for approvals is [seen] as too slow or cumbersome.”

The least favourite thing to find when you’re investigating a cyber incident, he said, “is no way to trace who did what because there’s nothing in the logs. The second worst is to find a bunch of identities that no one knows how they got there or how they had the access they did.” 

Shipley described agentic AI as “basically a stick of dynamite thrown into a fishpond when it comes to identity, and the results look the same. If organizations can’t tell if a human or their agent performed a set of actions, they can’t properly understand if they have a software vulnerability, an issue with employee awareness or motivation on security, or even worse, an insider threat.”

Worse yet, he said, “the whole concept of zero trust just got wiped out. Agents rely on huge amounts of trust and frankly, they haven’t earned it and have done everything they can possibly do to show they shouldn’t be trusted. From hallucinations to hijacking, this technology is not ready for prime time.”

Thomas Randall, research lead at Info-Tech Research Group, added that most of the Rubrik Zero Labs report “validates what the industry already knows. For years, Info-Tech research has shown that identity is a prime attack surface, that zero trust/least privilege/continuous verification are best practices, and that security training is imperative.”

Attack surface to drastically increase

He said that two elements stood out to him: “First is bridging human and non-human identity under a single umbrella; typically, we might understand these under separate domains of IAM vs DevOps secrets management, respectively. The report’s point is that attackers don’t respect those org-chart boundaries, so security teams should think beyond those boundaries, too.”

However, said Randall, “this framing overlooks that these identities are operationally different. While both authenticate and authorize, the tooling, telemetry, RACI, and risk models differ. A single ‘identity plane’ may be the goal conceptually, but practically, it’s hard to implement across those divergent ecosystems.”

The second element is, he said, “the stark claim that non-human identities now outnumber human users by around 82:1. As organizations start developing more AI agents (especially if individuals have free rein to develop their own copilots or GPTs), the attack surface drastically increases.”

Randall noted, “each copilot or GPT can hold API keys, OAuth tokens, or delegated permissions (for example, ‘read SharePoint docs, query CRM data, send emails.’). This is certainly where I think organizations need to be concerned: the gap between agentic AI rollout and AI governance grows increasingly wider.”

Organizations, he said, “have to be disciplined in controlling agent creation, credentialing, and lifecycle management; otherwise, the attack surface potentially increases drastically.” Security leaders must understand that IAM tools alone won’t protect against or help them restore the integrity of their identity infrastructure in the event of a compromise, he added.

In addition, said Mariappan, they must also understand that IAM tools alone won’t protect against or help them restore the integrity of their identity infrastructure in the event of a compromise.

In fact, she said, “while 87% of IT and security leaders plan to change their IAM providers, 60% have already switched providers in the last three years, signaling the industry’s dissatisfaction with current solutions for tackling identity-based threats. Our research reveals that a comprehensive identity resilience strategy is needed for when, not if, an attack strikes.”

This article originally appeared on CSOonline.


Read More from This Article: Agentic AI opens door to new ID challenges: Report
Source: News

Category: NewsNovember 14, 2025
Tags: art

Post navigation

PreviousPrevious post:메가존클라우드, 엔비디아와 한국 총판 계약 체결NextNext post:Make boards responsible for AI failures, banking regulator suggests

Related posts

Salesforce expands beyond the front office with Agentforce Operations
April 29, 2026
Designing the AI-native cloud: What enterprise architects are learning the hard way
April 29, 2026
Incentive drift: Why transformation fails even when everything looks green
April 29, 2026
Oracle NetSuite announces AI coding skills for SuiteCloud developers
April 29, 2026
Your AI agent is ready to go. Is your infrastructure?
April 29, 2026
Why I, the CEO, am personally building our AI strategy
April 29, 2026
Recent Posts
  • Salesforce expands beyond the front office with Agentforce Operations
  • Designing the AI-native cloud: What enterprise architects are learning the hard way
  • Incentive drift: Why transformation fails even when everything looks green
  • Oracle NetSuite announces AI coding skills for SuiteCloud developers
  • Why I, the CEO, am personally building our AI strategy
Recent Comments
    Archives
    • April 2026
    • March 2026
    • February 2026
    • January 2026
    • December 2025
    • November 2025
    • October 2025
    • September 2025
    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.