Cyber teams are struggling to keep up with a torrent of security alerts
Briefly

Organizations spend an average of 11 person-hours investigating a single identity-related security alert. Security teams face growing alert volumes driven by the rise of agentic AI, and rapid AI adoption often outpaces organizational oversight, creating new attack vectors. Identity is fragmented across cloud services, developer platforms, identity providers, and infrastructure resources such as databases, servers, Kubernetes, and workloads. This fragmented ecosystem of platforms, tools, and solutions slows response times and increases enterprise risk. Credential theft now accounts for one-in-five data breaches, and compromised credentials have surged 160% so far in 2025. Security teams use an average of 11 tools to trace identity-related issues.
"When it only takes minutes for threat actors to move laterally across your infrastructure, 11 hours to investigate an identity-related incident simply isn't good enough,"
"As we move deeper into the age of AI, we must remember that AI dramatically lowers the cost of identity attacks, and we must expect the frequency of them to increase."
"We must improve the trustworthiness of computing environments. We can only achieve this by eliminating anonymity and human error, and by unifying identity to simplify policy enforcement and enhance visibility of what each identity is doing."
Read at IT Pro
[
|
]