LIVE NEWS
  • Most Organizations Use AI Agents for Sensitive Security Tasks
  • Can U.S. and China avoid ‘Thucydides Trap’?
  • Wes Streeting Resigns, Setting Stage for Possible UK Leadership Challenge to Starmer
  • S&P 500 and Nasdaq 100 Post New Record Highs on Chip Stock Strength
  • US Army recovers remains of second soldier reported missing during Moroccan exercise
  • Melting of Greenland ice sheet could release large stores of methane
  • Remains of 2nd U.S. Army soldier who went missing during military exercises in Morocco have been recovered
  • Coinbase CEO Backs CLARITY Act Ahead of Key Senate Vote
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Most Organizations Use AI Agents for Sensitive Security Tasks
Cybersecurity

Most Organizations Use AI Agents for Sensitive Security Tasks

primereportsBy primereportsMay 14, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Most Organizations Use AI Agents for Sensitive Security Tasks
Share
Facebook Twitter LinkedIn Pinterest Email


The majority (93%) of global organizations use or plan to use AI agents for security tasks such as password resets and VPN access despite the potential for serious breaches and data leaks, according to Semperis.

The security vendor polled 1100 organizations in the US, UK France, Germany, Spain, Italy, Singapore and Australia to produce its State of Identity Security in the AI Era study.

As well as using agents for sensitive security work, or planning to within 12 months, the majority (92%) of respondents admitted AI is installed on at least some local machines with access to SSH and encryption keys, further exposing them to security risk.

At the same time, 74% agreed that AI will increase attacks on identity infrastructure.

Read more on identity threats: Hackers Exploit Compromised Enterprise Identities at Industrial Scale, Warns SentinelOne.

Despite exposing their organization to AI-shaped risks, only a third (32%) of respondents said they were “very confident” that they could regain control after an AI-driven credential exposure.

“What is striking about the study is not just how quickly AI is being integrated into identity systems but how unprepared many organizations are to recover when things go wrong,” said Grace Cassy, partner at cybersecurity venture capital firm Ten Eleven Ventures.

“Introducing AI at the identity layer offers operational advantages, but it must be accompanied by guardrails, observability and recovery readiness. It is a new dimension of an old question, really: are you resilient enough to respond in the event of critical disruption?”

Too Many Agents, Too Many Permissions

An explosion in non-human identities (NHIs) including AI agents is complicating the task of identity governance for security teams.

The challenge is that their proliferation means plenty of abandoned “zombie” agents and shadow NHIs which threat actors could hijack. It doesn’t help that many are over-permissioned as they’re granted the same rights as human users, the report explained.

It revealed that only 65% of organizations fully register, authenticate and authorize their AI identities in a formal system, while 6% don’t track them at all. Of those that do over half (57%) use the same system as for human identities.

What Best Practice Looks Like for AI Identity 

The good news is that AI identity governance is a priority for 83% of global organizations in the next 12 months, according to the study. But it’s unclear what measures they will take to control, monitor and secure usage.

For now, Semperis recommended organizations to:

  • Treat agents as NHIs rather than human identities
  • Enforce least‑privilege, just‑enough and just‑in‑time access for agents in the same way human identities are governed
  • Segregate agent and human trust boundaries where appropriate
  • Use user and entity behavior analytics (UEBAs) or similar tools to detect zombie or suspicious agent behavior
  • Ensure the organization can quickly recover identity systems to a trustworthy state if they are breached

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCan U.S. and China avoid ‘Thucydides Trap’?
primereports
  • Website

Related Posts

Cybersecurity

Adobe Express vs Canva: Which design tool is better?

May 13, 2026
Cybersecurity

Windows BitLocker zero-day gives access to protected drives, PoC released

May 13, 2026
Cybersecurity

It’s Patch Tuesday for Microsoft & Not a Zero-Day In Sight

May 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20265 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Most Organizations Use AI Agents for Sensitive Security Tasks
  • Can U.S. and China avoid ‘Thucydides Trap’?
  • Wes Streeting Resigns, Setting Stage for Possible UK Leadership Challenge to Starmer
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.