• About
  • Subscribe
  • Contact
Monday, February 23, 2026
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home CISO

AI exposure gap fuelled by supply chain risks and lack of identity controls

FutureCISO Editors by FutureCISO Editors
February 23, 2026
State of IT risk in Singapore

Photo by Pixabay: https://www.pexels.com/photo/caution-danger-information-safety-258063/

Share on FacebookShare on Twitter

The Tenable report, Cloud and AI Security Risk Report 2026, reveals a stark reality: organisations are struggling to manage cyber risks effectively as the pace of AI adoption and third-party code integration accelerates beyond their ability to secure it.

The study reveals 86% of organisations have implemented third-party code packages containing critical vulnerabilities, transforming the software supply chain into a persistent source of exposure.

Not an edge case: 86% of organizations expose their infrastructure to critical risks via third-party code packages, highlighting the urgent need for continuous monitoring.
Source: Tenable Cloud and AI Security Risk Report 2026
Liat Hayun

“The AI exposure gap represents a significant risk, as organisations must contend with inherited vulnerabilities faster than they can remediate them,” stated Liat Hayun, senior vice president of product management and research at Tenable.

This is particularly concerning in Asia, where rapid technological advancements and digital transformation initiatives are prevalent, making robust risk management even more critical.

Moreover, the report indicates that 65% of organisations expose high-value assets due to neglected cloud credentials—termed "ghost" secrets. With 18% of organisations granting AI services administrative permissions that often go unmonitored, the potential for exploitation becomes alarmingly high.

This situation is compounded by the fact that non-human identities—such as AI agents and service accounts—now pose 52% more risk than traditional human users.

For CISOs, the implications are clear. The lack of visibility and governance around AI-integrated systems necessitates a shift in focus toward comprehensive identity controls and enhanced security postures. The report advocates for the implementation of least privilege access for AI roles and the dissolution of static secret exposure to mitigate risk.

As organisations actively integrate AI into their operations, the report provides actionable insights for reducing risks across cloud and AI environments. Redefining exposure management practices to encompass software vulnerabilities, identity risk, and cloud security gaps is essential in this landscape marred by supply chain vulnerabilities.

Related:  75% of security incidents now identity-related

By unifying visibility across code packages, cloud environments, and identity access, CISOs can begin to manage actual business risks rather than merely addressing accumulated security debt.

Tags: AI exposure gapcloud securityidentity managementrisk assessmentsupply chain vulnerabilitiesTenable
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • AI exposure gap fuelled by supply chain risks and lack of identity controls
  • PodChats for FutureCISO: Use behavioural AI to shields against multi-cloud vulnerabilities
  • PodChats for FutureCISO: AI-driven identity governance in autonomous environments
  • Keeper adds full-screen terminal interface for vault management
  • AI revolutionising cyber attacks against Asia's supply chains

Categories

  • AI and Machine Learning
  • Artificial Intelligence
  • Blogs
  • CISO
  • CISO strategies
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Compliance and Governance
  • Compliance and Governance
  • Compliance and Governance|People
  • Compliance and Governance|Technology
  • Computer, Storage, Networks, Connectivity
  • Culture and Behaviour
  • Culture and Behaviour|People
  • Cyber risk management
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity careers
  • Cybersecurity operations
  • Cybersecurity operations
  • Data Protection
  • Data Protection
  • Endpoint Security
  • FutureCISO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • Incident Response
  • Network Security
  • People
  • Process
  • Remote work
  • Resources
  • Risk Management
  • Risk Management
  • Security
  • Technology
  • Training and awarenes
  • Videos
  • Vulnerabilities and threats
  • Vulnerabilities and threats
  • Webcasts/Podcasts
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl