AI and Complexity: The New Identity Protection Challenge

▼ Summary
– Identity has shifted from a tactical IT consideration to a strategic cybersecurity pillar due to remote work, cloud adoption, and distributed supply chains.
– IT and security leaders report low confidence in stopping identity-based attacks, citing fragmented visibility, identity sprawl, and legacy systems as key weaknesses.
– Complexity in identity infrastructure creates blind spots, limiting visibility into vulnerabilities and admin access, which hinders threat detection and policy enforcement.
– Phishing-resistant multifactor authentication adoption remains low due to operational friction, hardware costs, and compatibility challenges, despite broad recognition of its importance.
– Over half of organizations have experienced financial losses from identity-related breaches, driving increased investment in identity security and tool consolidation for simplification.
Identity security has rapidly evolved into a foundational element of modern cybersecurity frameworks, driven by the widespread shift toward remote work, cloud adoption, and increasingly interconnected digital ecosystems. According to a recent industry report, identity is no longer just an IT concern but a strategic pillar of cybersecurity, demanding greater attention from organizations worldwide.
The study, which gathered insights from 650 IT and security leaders across North America and Europe, identifies several pressing challenges. AI-driven threats, insufficient adoption of phishing-resistant authentication methods, and escalating financial risks are reshaping how businesses approach identity protection in the coming year.
A significant finding centers on a growing crisis of confidence. Many security professionals express strikingly low trust in their identity providers’ ability to thwart attacks. Concerns are mounting over issues like fragmented visibility, identity sprawl, and outdated systems that collectively weaken defensive postures.
Even tools designed to help, such as Identity Security Posture Management (ISPM), are underutilized. Adoption rates remain disappointingly low, despite the clear benefits these solutions offer in policy enforcement and overall security enhancement.
Infrastructure complexity continues to introduce dangerous blind spots. When identity data is scattered across disparate systems, it creates operational friction and broadens the potential attack surface. Many leaders admit they lack full visibility into identity vulnerabilities and administrative access, complicating efforts to detect and respond to threats effectively.
Multifactor authentication (MFA) presents another area where intention and implementation diverge. Although phishing-resistant MFA is widely acknowledged as essential, practical adoption remains limited. Very few organizations have fully integrated hardware tokens like FIDO2, citing operational hurdles such as token management, cost, and compatibility issues. The transition to passwordless systems is seen as a future goal, hindered by legacy infrastructure and user readiness.
Artificial intelligence is intensifying the threat landscape. AI-powered phishing campaigns, insider risks, and supply chain vulnerabilities are now dominating risk assessments and compelling organizations to reevaluate their security tools. In response, identity threat detection and response (ITDR) is gaining traction as a priority, though its adoption is slowed by integration challenges and scalability concerns.
On a positive note, budget allocations for identity security are rising. A strong majority of financial decision-makers are increasing investments in this area, recognizing a critical window to modernize defenses and address long-standing gaps. There is also a noticeable trend toward tool consolidation, with leaders seeking integrated solutions to reduce complexity and improve efficiency. This move is viewed not merely as a cost-saving measure but as strategic simplification essential for navigating multi-cloud environments.
The financial implications of identity breaches are undeniable. More than half of the organizations surveyed reported tangible losses linked to identity-related incidents, underscoring that identity risk isn’t theoretical, it hits the bottom line.
(Source: HelpNet Security)





