• About
  • Subscribe
  • Contact
Monday, April 27, 2026
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home Artificial Intelligence

Delinea: 95% of Singapore firms relaxed identity controls for AI

by FutureCISO Editors
April 27, 2026
Delinea: 95% of Singapore firms relaxed identity controls for AI

Photo by Google DeepMind from Pexels: https://www.pexels.com/photo/a-white-and-green-machine-with-people-on-it-18069490/

Share on FacebookShare on Twitter

Singaporean enterprises are under intense pressure to loosen identity controls to keep pace with AI, even as their security teams face growing visibility and governance gaps around human and machine identities.

The Delinea report, “Uncovering the Hidden Risks of the AI Race,” finds that 95% of organisations in Singapore push security teams to relax access controls to support AI initiatives—more than the 90% reported globally—despite widespread shortcomings in AI‑identity discovery, monitoring and privilege management.

Identity gaps in an AI‑driven environment

The report shows that AI‑driven automation is rapidly expanding the number of identities, including non‑human ones (NHIs) such as AI agents and service accounts.

In Singapore, 93% of organisations report at least one identity visibility gap, with 46% citing discovery and management of machine and AI identities as their biggest challenge. Half of respondents say these gaps are most likely to persist in AI‑related environments, nearly double the rate seen in legacy systems.

A third (37%) of Singaporean organisations say AI expansion has been one of the top drivers of increased NHI risk over the past 12 months, ahead of broader automation and cloud‑native workloads.

At the same time, 86% admit they cannot always understand why an NHI performed a privileged action, underscoring weak traceability and accountability for automated identities. Nearly six in ten (58%) lack viable alternatives to standing privileged access for AI and machine identities, leaving persistent, high‑risk permissions that could be exploited during an incident.

An AI‑security confidence paradox

Singaporean firms also exhibit a pronounced “AI security confidence paradox.” While 87% say their identity‑security posture is ready for AI‑driven automation, 47% acknowledge that governance around AI‑related identities is deficient.

Related:  AI-powered identity security to enhance governance

Organisations are almost twice as likely to rate their ability to discover and govern identities in AI settings poorly, compared with traditional systems, and only 14% say they can always explain why an AI agent took a privileged action—below the 20% global average.

“This pressure to move fast on AI is real, but identity governance has not kept pace, which exposes enterprises to significant risk,” said Art Gilliland, CEO at Delinea.

“As AI agents multiply across enterprise environments, these identities often have the least oversight. The organisations that will succeed in the AI era will be the ones that enforce real‑time, contextual access across every human, machine, and agentic AI identity.” Art Gilliland

Delinea proposes a unified approach combining cryptographic identity, just‑in‑time (JIT) authorisation, contextual access controls and full session visibility to ensure AI‑driven automation is both secure and auditable [Delinea 2026].

Tags: AI‑driven automation securityAI‑driven identity securityDelineaidentity securitynon‑human identity riskzero‑trust JIT authorisation

FutureCISO Editors

No Result
View All Result

Recent Posts

  • Delinea: 95% of Singapore firms relaxed identity controls for AI
  • CrowdStrike unites industry around AI‑driven vulnerability gap
  • PodChats for FutureCISO: The weak link CISOs can’t ignore in 2026
  • Only 5% of firms fully trust their cybersecurity vendors
  • New Keeper tightens privilege approval workflows

Categories

  • AI and Machine Learning
  • Artificial Intelligence
  • Blogs
  • CHRO
  • CISO
  • CISO strategies
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Compliance and Governance
  • Compliance and Governance
  • Compliance and Governance|People
  • Compliance and Governance|Technology
  • Computer, Storage, Networks, Connectivity
  • Culture and Behaviour
  • Culture and Behaviour|People
  • Cyber risk management
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity careers
  • Cybersecurity operations
  • Cybersecurity operations
  • Data Protection
  • Data Protection
  • Endpoint Security
  • Future Workplace
  • FutureCISO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • HR, education and Training
  • Incident Response
  • IT-OT integration
  • Network Security
  • Operations
  • People
  • Process
  • Remote work
  • Resources
  • Risk Management
  • Risk Management
  • Security
  • Tactics and Strategies
  • Technology
  • Training and awarenes
  • Videos
  • Vulnerabilities and threats
  • Vulnerabilities and threats
  • Webcasts/Podcasts
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl