THE LATEST CYBERSECURITY TRENDS & HOW TO RESPOND IN Q2 2026

The cybersecurity stories this quarter are around identity, AI, and software visibility

It’s May, and when the most important 2026 cybersecurity trends in Q2 whistle past in feeds on my desktop, I don’t see five neat buckets. I see one rather messy, very modern problem wearing several hats. Attackers are moving faster, AI is amplifying both sides (attacker and defender), and the old comfort blanket of “we’ll catch it in the SIEM” is looking pretty darn threadbare.

The World Economic Forum says 94% of respondents see AI as the biggest driver of cybersecurity change in the year ahead, while 87% identified AI-related vulnerabilities as the fastest-growing cyber risk over 2025. It also found that 73% of respondents were personally affected by cyber-enabled fraud in 2025, with phishing, vishing, and smishing leading the pack, enabled by inadequate identity management

That matters because the attack is no longer just “someone clicked something daft.” The attack is now often a chain of trusted actions across cloud, SaaS, APIs, and collaboration tooling. The breach increasingly looks like normal work, until it very much doesn’t.

For cloud security architects and SOC teams, one of the biggest 2026 cybersecurity trends is that valid access has become the attack surface. The average eCrime breakout time fell to 29 minutes in 2025, with the fastest observed breakout at 27 seconds, and 82% of detections were malware-free. Verizon’s 2025 DBIR says that stolen credentials featured in 22% of breaches overall, and in basic web application attacks that figure hit 88%

Asking the Right Questions

That changes the defensive question. I am no longer asking only, “Did malware land?” I am asking, “Which identity logged in, what could it touch, what did it actually use, and why was that permission still there in the first place?” That’s a far more useful question, and a far more annoying one if our estate is full of standing privilege, stale roles, and AI or SaaS apps that the office management team adopted without telling anyone.

This is why identity-first access security isn’t some fashion accessory or glitter for slide decks. It is an operational necessity and the reality of 2026. 

Google Cloud’s Threat Horizons report shows just how fluid initial access has become: in H1 2025, weak or absent credentials accounted for 47.1% of cloud initial access, and although software exploitation overtook credentials in H2 2025, the broader lesson is the same. Attackers will use whatever gets them into our control plane fastest, whether that’s an unpatched service or a perfectly valid login. 

AI makes this worse and more interesting. It is now common to have AI assistants, workflow agents, ticket bots, deployment automation, and various “temporary” experiments all making decisions and calling systems on the organization’s behalf.Security teams are now trying to apply zero-trust principles and proper access controls to these autonomous systems, while Microsoft warns that workload identities and machine-to-machine access paths are increasingly attractive targets. 

No Secret Agents, Just Identity

This is the part many teams still underplay: if an agent can read, write, deploy, approve, sync, or trigger, it should be treated like an identity. Not a feature. Not a convenience. Not a magical productivity pixie. An identity.

Any platform model must be built around continuous entitlement, visibility across cloud and SaaS, just-in-time access, zero standing privilege, lifecycle control, policy-based approvals, and audit-ready evidence for both human and non-human identities. That means less mystery, less permanent privilege, and fewer “temporary exceptions” lingering in production.

Got Licence?

The Cloud Security Alliance found that 55% of employees adopt SaaS without security’s involvement, 57% report fragmented SaaS administration, 58% struggle to enforce privileges, and 54% lack lifecycle automation. Zylo’s 2025 SaaS Management Index says the average company now uses 275 SaaS applications and spends about $49 million annually, while IT directly owns only 26.1% of that spend and 15.9% of the apps. 

That should make every IT and SOC lead slightly twitchy, and with good reason. If you cannot see who has access to what, you also cannot see who still has a paid seat they no longer need, who kept a premium license after changing roles, or which orphaned account still owns a subscription after the human attached to it left six months ago.

Finances and budgets are getting tight, and will get tighter. License visibility is rapidly becoming a useful by-product of identity tracking and governance. When access discovery and lifecycle controls are working properly, unused licenses and stale entitlements begin to show themselves without a separate archaeology project. That helps IT reduce waste, improve joiner-mover-leaver hygiene, tighten access reviews, and give finance something better than a spreadsheet and an argument: evidence

Responding to 2026 Cybersecurity Trends

Let’s keep this practical.

  • First, reduce standing privilege wherever possible and move high-risk access to time-bound approval. 
  • Second, treat AI agents and service identities as first-class identities with scoped permissions, owners, and expiry. 
  • Third, unify entitlement visibility across cloud and SaaS so your SOC is not defending three different truths at once. 
  • Fourth, move towards passkeys for workforce authentication; FIDO says 87% of surveyed organizations have deployed or are deploying them, and 90% of deployers report a moderate to strong security impact. Useful, though still not a cure for over-entitlement after sign-in. 
  • Finally, do not ignore crypto-agility. NIST says quantum-vulnerable algorithms are on a path to deprecation and removal by 2035, with high-risk systems moving sooner. Personally, that doesn’t mean I panic about Q-Day over my morning coffee. But it does mean I’d start building cryptographic inventory and transition planning now, before future-me has to untangle it while everything else is also on fire. 

So, for me, the defining 2026 cybersecurity trends in Q2 are not just AI, identity, SaaS sprawl, or remote access in isolation. It‘s that they now overlap. The winning response isn’t more noise. It’s sharper control over who, what, and which machine can do anything at all. It’s about being future-ready to manage AI access and for quantum cybersecurity, and, as a happy by-product, financially savvy with fewer ghost licences lurking in the stack.

In about 30 minutes, you can map every entitlement across users, agents, and SaaS apps in one place, with our Trustle free trial. Total multi-cloud visibility, see over-provisioned roles, human, machine, and AI. From there, move to time-bound, policy-driven access, remove standing privilege, and let lifecycle controls handle the rest, giving you tighter identity control with audit-ready evidence you can stand behind.

Nik Hewitt

Industry

May 7, 2026

Don't fall behind the curve

Discover powerful features designed to simplify access management, track progress, and achieve frictionless JIT.

Free trial