FB pixel

Lack of visibility into AI agents and identities brings threats to orgs, says Permiso

Categories Access Control  |  Biometrics News
Lack of visibility into AI agents and identities brings threats to orgs, says Permiso
 

Organizations are already integrating non-human identities, such as AI agents, and the trend is likely to continue throughout 2026. The introduction of these technologies is opening new security frontiers: A recent survey from identity security company Permiso Security shows that 82 percent of surveyed organizations say that AI agents or automated systems have direct access to production or sensitive data.

​Although the vast majority of organizations (95 percent) believe they can track non-human identities (NHIs), Permiso’s research suggests that they likely lack visibility into their operations. NHIs include service accounts, API keys, access tokens, certificates and AI agents.

“Organizations are deploying AI systems faster than they can secure them, granting access faster than they can track it, and generating identities faster than they can manage them,” Paul Nguyen, the firm’s co-CEO, says in a statement. “Most organizations don’t have visibility into which AI systems have access, what permissions they hold, or what they’re doing with the data they can access.”

Almost all organizations participating in the survey said that their AI systems can create or modify identities and permissions. Despite this, organizations rank non-human identities as least risky despite managing thousands of them. While they don’t fall for phishing, these identities often get hardcoded in repositories and retain excessive permissions indefinitely. This represents a significant perception gap, says Permiso.

The issue is not just non-human identities. Organizations generally lack insight into their identity infrastructure, resulting in serious impacts on security, according to the Permiso State of Identity Security 2026 report.

The research, which surveyed 512 organizations, showed that companies use an average of two to three identity providers, such as Okta, Ping Identity and Microsoft Entra, and an equal number of cloud service providers.

This results in a fragmented authentication landscape with limited visibility into potential threats to identity. Despite a large number of security incidents related to identity, only 43 percent of organizations can detect identity-based risks before incidents occur.

“Organizations keep asking us for faster threat detection,” said Jason Martin, co-CEO at Permiso Security. “But when we dig into what’s slowing them down, it’s always the same answer: fragmented visibility. You can’t detect what you can’t see, and you can’t respond quickly when you’re spending hours correlating data manually.”

Permiso claims that organizations have other security misconceptions when it comes to identity threats.

Identity-related attacks happen when threat actors gain unauthorized access to an organization’s data and systems by using stolen login credentials belonging to employees, external vendors, or automated accounts like AI agents.

Most companies believe that the majority of risks come from employees, but concerns about third-party vendors have risen sharply after major breaches, such as SolarWinds, Okta, MOVEit, which involved compromised vendor credentials.

SaaS continues to have the worst visibility when it comes to identities, compared to IaaS, PaaS, on-premise systems and identity providers, which score lowest on the risk level, according to the research.

“If employees are your biggest risk and SaaS is your biggest visibility gap, then the intersection represents your highest-risk, lowest-visibility attack surface. That’s precisely where attackers operate,” says the report.

According to Permiso’s data, 79 percent of organizations can confirm identity-based threats within 24 hours, while 18 percent say they can do the same within one hour. These numbers represent a large improvement compared to 2024, when only 61 percent claimed they could detect a threat within one day.  However, 16 percent still need up to seven days, while four percent need more than a week to detect identity threats.

Another task organizations face is assessing the potential fallout of a security threat, which determines the next steps. Less than a third can determine the complete blast radius within minutes when compromise is detected, while more than half need hours. A minority of 16 percent need days.

Visibility into identity accounts also plays a role in this. More than 80 percent of organizations say that security alerts are triggered by unmanaged accounts, shadow identities and misconfigured permissions. As security teams investigate false alarms, this takes away time from dealing with real threats and creates “alert fatigue.”

AI has static identity verification in its crosshairs. Now what?

Related Posts

Article Topics

 |   |   |   |   |   |   | 

Latest Biometrics News

 

AI fakery is turning fear into a voter suppression tool ahead of US elections

In the months leading up to the 2026 midterm elections which could see Democrats sweeping both the House and Senate,…

 

Alcatraz partners with gun violence group on school, workplace safety

Alcatraz has joined the Active Shooter Prevention Project (ASPP), a U.S.-based initiative that develops strategies to reduce risks in schools,…

 

V-Key gets PE firm backing to expand mobile digital identity security footprint

Singapore-headquartered digital identity and Mobile Application Protection and Security (MAPS) provider V-Key has a new majority investor, with Tower Capital…

 

IDfy secures $52M to pursue digital ID trust services ambitions

Digital ID verification firm IDfy has obtained funding of 476 crore Indian rupees, approximately US$52 million, to pursue its digital…

 

WSO2 to help MOSIP’s passwordless authentication platform eSignet Go Thunder

IIIT-Bangalore, home to India’s burgeoning digital public goods efforts, has formed a partnership through the MOSIP initiative it hosts with…

 

Entrust face biometrics show major gains in NIST FRTE

A face biometrics algorithm submitted by Entrust to the NIST Face Recognition Technology Evaluation (FRTE) 1:1 Verification has made significant…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events