The AI landscape doesn't move in one direction — it lurches. Some techniques leap from experiment to table stakes in a single quarter; others stall against regulatory walls, technical ceilings, or organisational inertia that no amount of hype can dislodge. Knowing which is which is the hard part. The State of Play cuts through the noise with a rigorously maintained index of AI techniques across every major business domain — classified by maturity, evidenced by real-world adoption, and updated daily so you always know where you stand relative to the field. Stop guessing. Start knowing.
A daily newsletter distilling the past two weeks of movement in a domain or two — delivered to your inbox while the index updates in the background.
Each dot marks the weighted maturity of practices within a domain — hover for a brief summary, click for more detail
AI that detects anomalous authentication and access patterns indicating compromised credentials or insider threats. Includes impossible travel detection and privilege escalation alerting; distinct from zero-trust policy enforcement which defines access rules rather than detecting violations.
Identity and access anomaly detection is a proven practice with a stubborn effectiveness gap. ML-driven behavioral analytics -- flagging impossible travel, privilege escalation, and credential misuse -- have been generally available across major SIEM and identity platforms since the early 2020s, with multiple Forrester TEI studies documenting ROI above 240%. The tooling is mature, the vendor ecosystem is consolidated, and budget commitment is strong. Yet identity breaches keep climbing. The central tension is not whether the technology works in controlled deployments but whether organisations can operationalise it at scale: tuning behavioral baselines, managing false-positive volumes that still overwhelm most SOC teams, and extending coverage to non-human identities that now vastly outnumber human users. The practice is firmly good-practice -- the question is execution quality, not viability.
The vendor ecosystem has fully consolidated around platform-integrated behavioral analytics with expansion to non-human identities accelerating in April-May 2026. Microsoft Sentinel's UEBA behaviors layer reached GA in January 2026; Exabeam extended Agent Behavior Analytics to Google Cloud agents (1,100+ deployments); LogRhythm-Exabeam merger finalized January 2026 consolidating SIEM with AI-driven analytics; and every major platform -- Darktrace, Securonix, Okta, CrowdStrike, Ping Identity -- ships competitive anomaly detection. Market momentum remains strong: 95% of organizations plan increased cybersecurity budgets with 44% citing AI as primary driver; UEBA market forecast at 47.2% CAGR (USD 4.35B 2025 → USD 65.1B 2032).
The capability-outcome gap has widened rather than closed. RSA 2026 survey shows 69% of organizations experienced identity breaches globally (92% in Australia), with 45% incurring costs exceeding $10M -- despite widespread UEBA platform availability. Cybersecurity Insiders April 2026 survey reveals 92% lack visibility into AI identities, 71% confirmed AI tool access but only 16% report effective governance, 95% doubt containment capability if compromise occurs. SANS 2026 ITDR survey exposed operational response lag: 68% detect identity attacks within 24 hours but only 55% contain within 24 hours. False positives persist as operational tax: Microsoft's impossible travel detection continues triggering alerts from Microsoft's own infrastructure, practitioners report 30-day baselines generating 200 daily anomalies with only 5 worth investigating, and analyst trust erodes as baselines drift.
Non-human identity anomaly detection is the acknowledged frontier with structural gaps. Machine identities outnumber humans by 45:1 to 100-500:1 depending on environment, yet only 12% have automated lifecycle management and only 7% of organizations achieve organization-wide AI adoption. Vendor marketing of AI agent anomaly detection expanded (five vendors announced frameworks at RSAC 2026) but critical gaps remain unresolved: dynamic scope creep, non-deterministic audit trails, cross-agent context poisoning. Cloud Security Alliance analysis argues the fundamental problem is governance model misalignment -- machine identities operate as "autonomous trust executors," making single-token compromise cascade differently than user compromise, requiring distinct behavioral baselines impossible to establish under traditional user-centric models.
— SANS survey of hundreds of organizations: 68% detect identity attacks within 24h but only 55% contain them—reveals operational maturity gap despite anomaly detection adoption at scale.
— CrowdStrike extends ITDR to cloud identities using AI behavioral analysis trained on trillions of events to detect unauthorized access patterns and privilege escalation anomalies in hybrid environments.
— Splunk official documentation: 6 operationalized UEBA detections (abnormal RDP login, administrative activity, email temporal patterns) deployed in production cloud environments—demonstrates detection capability at enterprise scale.
— Critical assessment of production UEBA barriers: behavioral baseline drift, stale models in cloud-native deployments, 42% of teams deploying without tuning—documents operational constraints limiting anomaly detection effectiveness at scale.
— Operationalized KQL detection patterns for identifying compromised AI agent identities via legacy Azure AD Graph API abuse—extends anomaly detection to non-human identities with production-ready rules.
— Critical examination of UEBA implementation gap: entity fragmentation, contaminated baselines from shared accounts, IdP-only blindness—entity governance quality determines anomaly detection accuracy in production deployments.
— Comprehensive detection framework for AI agent privilege escalation across six monitoring areas (identity, connectors, data access, instructions, privilege changes, approval evasion)—addresses emerging scope gap in non-human identity anomaly detection.
— Technical analysis of identity threat detection with concrete attack metrics (600M identity attacks/day, ransomware 2.75x YoY growth) and detection signatures for Kerberoasting, DCSync, Golden Ticket lateral movement anomalies.