Intelligent CISO Issue 86 | Page 21

cyber

TRENDS
• Machine identity growth continues at pace – Machine identities outnumber human identities by an overwhelming margin and continue to grow quickly. Eighty-five per cent of APAC security leaders anticipate the number of machine identities in their organisation to increase, by as much as 150 % over the next year.
• AI looms large on the machine identity threat horizon – As AI systems become a growing target for cyberattacks, 82 % of APAC security leaders believe machine identity security will play a vital role in securing the future of AI. 82 % of leaders also say securing AI models from manipulation and theft means putting greater emphasis on the need for machine identity authentication and authorisation.
• Machine identity security programs lack maturity – While 94 % of APAC security leaders report some form of machine identity security programme, many of these programmes lack maturity. Respondents reveal the lack of a cohesive machine identity security strategy as their biggest concern( 46 %), followed by challenges adapting to shorter machine identity lifecycles( 42 %) and the possibility of adversaries exploiting stolen machine identities( 38 %).
• Siloed approach to securing machine identities creates risk – Where multiple tools to secure machine identities exist within organisations, inefficiencies, risk and management challenges are created. For example, responsibilities for preventing machine identity-related compromises were
As AI systems become a growing target for cyberattacks, 82 % of APAC security leaders believe machine identity security will play a vital role in securing the future of AI.
found to be split among security( 51 %), development( 29 %) and platform( 14 %) teams.
“ Machine identities of all kinds will continue to skyrocket over the next year, bringing not only greater complexity but also increased risks,” said Kurt Sand, GM of Machine Identity Security, CyberArk.
“ Cybercriminals are increasingly targeting machine identities – from API keys to code signing certificates – to exploit vulnerabilities, compromise systems and disrupt critical infrastructure, leaving even the most advanced businesses dangerously exposed. This research highlights the urgency for security leaders to establish a comprehensive, end-to-end machine identity security strategy that tackles the non-human identities that matter most to prevent potential attacks and outages – especially as AI agents continue to rise and the quantum attack timeline shortens.”
WWW. INTELLIGENTCISO. COM 21