Skip to content
Breaking News
 2026-03-10 U.S. CISA adds Ivanti EPM, SolarWinds, and Omnissa Workspace One flaws to its Known Exploited Vulnerabilities catalog  2026-03-10 No, it’s not ‘unnecessarily burdensome’ to control your own data  2026-03-10 The OT security time bomb: Why legacy industrial systems are the biggest cyber risk nobody wants to fix  2026-03-10 Digital Threat Detection Tools & Best Practices  2026-03-10 Deobfuscating Files for Flags: Huntress CTF 2025 Retro
  • Home

Cybernoz – Cybersecurity News

Search

Why access decisions are becoming the weakest link in identity security

 Cybernoz  March 10, 2026  Posted in CISOOnline
Share: XFacebookPinterestRedditVKDiggLinkedinMix

The rise of the ‘digital employee’

The denominator is expanding again as organizations deploy AI-driven automation and agentic systems that act as virtual workers. These are no longer simple scripts. They perform multi-step tasks across financial systems, data platforms and operational tooling.

When an AI agent is tasked with generating financial reports or orchestrating workflows across systems, it inherits broad access. If that agent makes an inappropriate access decision, accountability becomes ambiguous. The original manager approval often applies only at creation, not as scope and behavior evolve.

At the same time, shadow AI usage compounds the problem. Employees frequently use personal credentials to connect unmanaged AI tools to sensitive data sources, creating parallel access paths that never appear in formal identity systems. Identity governance, historically centered on human employees, is now confronted with a growing population of digital actors operating beyond traditional visibility.



Source link

Related Articles

Cyberrecovery Fail 16z9 DE Only
Die besten Cyber-Recovery-Lösungen | CSO Online
I replaced manual pen tests with automation. Here’s what I learned.
I replaced manual pen tests with automation. Here’s what I learned.
Trump’s cyber strategy emphasizes offensive operations, deregulation, AI
Trump’s cyber strategy emphasizes offensive operations, deregulation, AI
insider threat shadow worker steal stealing theft data
Europa im Visier von Cyber-Identitätsdieben

Post navigation

Darktrace appoints Ed Jennings as president and CEO to steer next phase of cybersecurity growth →
← Ericsson US confirms breach after third-party provider attack

Latest Posts

  • U.S. CISA adds Ivanti EPM, SolarWinds, and Omnissa Workspace One flaws to its Known Exploited Vulnerabilities catalog
  • No, it’s not ‘unnecessarily burdensome’ to control your own data
  • The OT security time bomb: Why legacy industrial systems are the biggest cyber risk nobody wants to fix
  • Digital Threat Detection Tools & Best Practices
  • Deobfuscating Files for Flags: Huntress CTF 2025 Retro

Copyright © 2026 Cybernoz - Cybersecurity News

Design by ThemesDNA.com