Technology
Trending

KSA Businesses Tackle Identity Silos and AI Security Amid Rising Cyber Insurance Pressures

Riyadh – Asdaf News:

CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced the release of the CyberArk 2025 Identity Security Landscape Report, a global study revealing how organizations are inadvertently creating a new identity-centric attack surface through growing use of AI and cloud.

The report shows that machine identities are mostly unknown and uncontrolled within organizations in the Kingdom of Saudi Arabia and globally, while the primary roadblocks to Agentic AI adoption involve security concerns around external manipulation and sensitive access, signposting the emergence of a new and potent identity security challenge.

“The race to embed AI into environments has inadvertently created a new set of identity security risks centered around the access of unmanaged and unsecured machine identities – and the privileged access of AI agents will represent an entirely new threat vector,” said Craig Harwood, Area VP for Africa and the Middle East at CyberArk. “For organizations in Saudi Arabia to stay resilient, CISOs and security leaders must modernize their identity security strategies to contend with a new and expanding attack surface characterized by the proliferation of identities with privileged access and made worse by damaging identity silos.”

CyberArk 2025 Identity Security Landscape Report Highlights

‘Rise of the machines’ contributes to unsecured privilege sprawl: Machine identities, driven primarily by cloud and AI, now vastly outnumber human identities within organizations and nearly half have sensitive or privileged access. However, many enterprises leave both human and machine access to critical systems under-secured.

  • There are 82 machine identities for every human in organizations worldwide.
  • In 88% of organizations in KSA, the definition of a ‘privileged user’ applies solely to human identities – but 80% of machine identities have privileged or sensitive access.
  • Only forty-four percent of organizations in KSA have identity security controls in place to secure AI and large language model (LLM) environments.
  • Only 26% of organizations in KSA have identity security controls in place to secure cloud infrastructure and workloads, compared to 32% globally.
  • Sixty-eight percent of organizations in KSA experienced at least two successful identity-centric breaches in the past 12 months, ranging from supply chain attacks and compromised privileged access to identity and credential theft.

AI is everywhere and identity-centric agentic AI risk looms: Sanctioned and unsanctioned adoption of AI and large language models (LLMs) is simultaneously transforming organizations while amplifying cybersecurity risks. Concerns around the emergence of AI agents and their privileged access underscores the urgency for targeted identity security investment.

  • AI will drive the creation of the greatest number of new identities with privileged and sensitive access in 2025.
  • Fifty-eight percent of organizations in KSA cannot secure shadow AI usage in their organization.
  • AI agent adoption roadblocks include manipulation and sensitive access concerns.

Complexity and identity silos are overwhelming security leaders and undermining business resilience: Fragmented identity security programs and poor environmental visibility are diminishing resilience in the face of evolving cybersecurity threats. Most organizations face increased privilege-related compliance pressure.

  • Seventy percent of respondents in KSA say identity silos are a root cause of organizational cybersecurity risk.
  • Eighty-eight percent of organizations in KSA are under increased pressure from insurers mandating enhanced privilege controls.
  • Seventy-five percent of security professionals globally agree that their organizations prioritize business efficiencies over robust cybersecurity.
  • Human and machine identities globally – many of them with privileged access – are expected to double in 2025.
Show More

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button