Artificial Intelligence (AI) continues to dominate conversations in business and technology, and nowhere is its potential more hotly debated than in cybersecurity, writes Phil Calvin, Chief Product Officer, Delinea.
As organisations face increasingly sophisticated threats, many are eager to implement AI-driven cybersecurity solutions. However, without a clear strategy, adopting “AI for AI’s sake” can lead to wasted resources and misaligned priorities. To truly strengthen their security posture, businesses must focus on integrating AI tools that deliver measurable value and amplify the effectiveness of existing cybersecurity measures.
The strategic role of AI
Cyber threats are evolving faster than human analysts can keep up and companies are reaching to AI to help them in combat. Sixty-eight per cent of businesses state that they use at least one AI technology, and 32 per cent have plans to adopt AI. While AI is not a cure-all, it can serve as a powerful tool when itโs strategically integrated into practical, scalable solutions. For example:
– Rapid anomaly detection accelerates the identification of identity- and privilege-related anomalies;
– Context-based risk scoring delivers insightful, context-aware assessments, enabling teams to prioritise the most pressing risks with precision and efficiency; and
– Natural Language Querying allows security professionals to surface insights, simplify complex investigations, and turn data into actionable intelligence.
However, the success of these AI security tools and others depends on their application within a well-defined strategy.
Aligning budgets with strategic goals
The global AI cybersecurity market is projected to grow at a compound annual growth rate (CAGR) of 19.43 per cent between 2024 – 2034, reaching 146.52 billion USD by 2034. Meanwhile, IT security budgets are rising, with companies planning to increase their budgets by 9pc. Despite these investments, simply spending more doesnโt guarantee better outcomes. Recent ransomware attacks underscore the dangers of poorly allocated resources. Instead of chasing the latest tools, organisations must take a strategic approach to budgeting.
Senior IT leaders should focus investments on critical areas such as Identity Access Management (IAM), endpoint security, data protection, and network security. IAM, for example, is increasingly vital in securing digital identities and controlling access to sensitive systems. Delineaโs research shows that one in four organisations already spend over 30pc of their IT budget on IAM technology and processes, and 78pc of businesses plan to increase identity security spending in 2025, reflecting its role as a cornerstone of modern cybersecurity strategies. By prioritising these foundational elements, organisations can maximise the return on their security investments.
Bridging the cybersecurity talent gap
The cybersecurity industry faces a well-documented talent shortage, with 3.5 million cybersecurity jobs estimated to be unfilled. This gap poses significant challenges for organisations attempting to build robust security teams. Many companies are finding the demand to be quickly outpacing the supply, and the number of systems that need to be secure growing faster and faster. Addressing this shortage requires a multi-pronged approach. AI can play a crucial role in alleviating the burden on overworked teams by automating repetitive tasks such as log analysis and routine threat identification. In parallel, organisations should invest in workforce development through training programs and opportunities for continuous learning. Offering clear career progression and skills development can help retain talent, prevent burnout, and prepare teams for emerging threats.
Adopting Zero Trust principles
In an era of increasingly complex cyber threats, Zero Trust principles are becoming indispensable. This approach assumes that no user or device – whether inside or outside the network – can be trusted by default. By implementing Zero Trust architectures, organisations can significantly enhance their defences.
Key Zero Trust techniques include Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and just-in-time privilege elevation. These measures ensure that access to systems and data is granted only when necessary and based on strict verification. Additionally, layered security strategies – which incorporate multiple defences to intercept threats at various stages – provide a safety net if one layer fails. This comprehensive approach minimises risks and enhances overall resilience.
Countering AI-driven cyberattacks
While AI offers significant cybersecurity benefits, cybercriminals are also leveraging it to launch more sophisticated attacks. AI-powered tools enable adversaries to bypass traditional defences, making it imperative for organisations to stay one step ahead. Data shows that the vast majority of businesses (94%) are planning to adopt AI-driven identity technologies now or in the near future, with 55% having already adopted or are already in the process of adoption. However, defence strategies must continue to evolve to counter AI-driven threats. Advanced tools like intelligent authorisation and context-aware access controls can help mitigate these risks. For instance, pairing MFA with behavioural analytics ensures that access is granted based on both identity verification and real-time user behaviour. This approach creates additional layers of security, making it harder for attackers to exploit vulnerabilities.
Building a strategic foundation for AI adoption
AI holds immense promise for transforming cybersecurity, but its value is realised only when applied strategically. Organisations that focus on aligning AI adoption with clear priorities – from securing critical assets to addressing the talent gap – can build more resilient defences against an ever-changing threat landscape. By leveraging AI as a tool to build out team support and integrating it into a thoughtful, layered approach, businesses can turn innovation into actionable protection, ensuring that their cybersecurity strategies are both effective and future-ready.




