home.social

#nonhumanidentities — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #nonhumanidentities, aggregated by home.social.

  1. AI Agents Fuel 76% Surge in Non-Human Identities

    The machines are catching up - a staggering 76% surge in non-human identities, driven by AI agents acting on our behalf, is raising critical questions about governance and control. As these machine-driven identities multiply, gaps in oversight are emerging, threatening to upend traditional operational and policy domains.

    osintsights.com/ai-agents-fuel

    #NonhumanIdentities #AiAgents #SansInstitute #IdentityGovernance #EmergingThreats

  2. 🎯 FINAL POST FROM THE FLOOR: #BlackHatUSA 2025 Coverage!

    Access Roulette: How to Stop Betting Your Security on Standing Privileges

    This wraps up our on-location content from Las Vegas!

    Next week we'll reconnect with our main event sponsors— BLACKCLOAK, Dropzone AI, Stellar Cyber, and Akamai Technologies—to bring you their post-event insights and feedback. Of course ThreatLocker's recap was already captured on the floor and published earlier today. Plus, watch for our closing reflection articles from me Marco Ciappelli and Sean Martin, CISSP!

    Our final floor conversation comes thanks to our friends at Apono 🙏

    Modern enterprises are gambling with security every day. Static permissions, manual approvals, and periodic audits create "privilege creep" that turns every over-privileged account into a potential breach waiting to happen.

    At #BlackHat USA 2025, Ofir Stein from #Apono reveals how to break this dangerous cycle.

    The stakes keep rising:
    • Non-human identities (service accounts, #APIs, #AIagents) retain high-level privileges long after tasks complete
    • Organizations discover risks during audits but lack scalable remediation
    #Business teams need rapid access while security teams battle expanding #attacksurfaces

    Apono's Zero Standing Privilege model:
    • Removes ALL permanent access by default
    • Grants access dynamically based on business context
    • Automatically revokes permissions when tasks complete
    • Works for both human AND non-human identities
    • Integrates with existing #identity providers—no rip and replace

    Key capabilities:
    • Context-based policy management aligned with business objectives
    • Continuous discovery of identities, privileges
    • Automated remediation of unnecessary privileges
    • Real-time anomaly detection feeding #SOC workflows
    • Scalable across centralized and decentralized environments

    The result?
    Engineers gain control over their access (building trust), security teams maintain tight governance, and organizations can finally stop betting their security on standing privileges.

    📺 Watch the video: youtu.be/ciBsH84PVQU

    🎧 Listen to the podcast: brand-stories-podcast.simpleca

    📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about Apono: itspm.ag/apono-1034

    ✦ Catch more stories from Apono: itspmagazine.com/directory/apo

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #IdentityManagement #ZeroTrust #AccessControl #BlackHatUSA #BHUSA25 #PrivilegeManagement #IAM #SecurityAutomation #NonHumanIdentities

  3. 🎯 FINAL POST FROM THE FLOOR: #BlackHatUSA 2025 Coverage!

    Access Roulette: How to Stop Betting Your Security on Standing Privileges

    This wraps up our on-location content from Las Vegas!

    Next week we'll reconnect with our main event sponsors— BLACKCLOAK, Dropzone AI, Stellar Cyber, and Akamai Technologies—to bring you their post-event insights and feedback. Of course ThreatLocker's recap was already captured on the floor and published earlier today. Plus, watch for our closing reflection articles from me Marco Ciappelli and Sean Martin, CISSP!

    Our final floor conversation comes thanks to our friends at Apono 🙏

    Modern enterprises are gambling with security every day. Static permissions, manual approvals, and periodic audits create "privilege creep" that turns every over-privileged account into a potential breach waiting to happen.

    At #BlackHat USA 2025, Ofir Stein from #Apono reveals how to break this dangerous cycle.

    The stakes keep rising:
    • Non-human identities (service accounts, #APIs, #AIagents) retain high-level privileges long after tasks complete
    • Organizations discover risks during audits but lack scalable remediation
    #Business teams need rapid access while security teams battle expanding #attacksurfaces

    Apono's Zero Standing Privilege model:
    • Removes ALL permanent access by default
    • Grants access dynamically based on business context
    • Automatically revokes permissions when tasks complete
    • Works for both human AND non-human identities
    • Integrates with existing #identity providers—no rip and replace

    Key capabilities:
    • Context-based policy management aligned with business objectives
    • Continuous discovery of identities, privileges
    • Automated remediation of unnecessary privileges
    • Real-time anomaly detection feeding #SOC workflows
    • Scalable across centralized and decentralized environments

    The result?
    Engineers gain control over their access (building trust), security teams maintain tight governance, and organizations can finally stop betting their security on standing privileges.

    📺 Watch the video: youtu.be/ciBsH84PVQU

    🎧 Listen to the podcast: brand-stories-podcast.simpleca

    📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about Apono: itspm.ag/apono-1034

    ✦ Catch more stories from Apono: itspmagazine.com/directory/apo

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #IdentityManagement #ZeroTrust #AccessControl #BlackHatUSA #BHUSA25 #PrivilegeManagement #IAM #SecurityAutomation #NonHumanIdentities

  4. 🎯 FINAL POST FROM THE FLOOR: #BlackHatUSA 2025 Coverage!

    Access Roulette: How to Stop Betting Your Security on Standing Privileges

    This wraps up our on-location content from Las Vegas!

    Next week we'll reconnect with our main event sponsors— BLACKCLOAK, Dropzone AI, Stellar Cyber, and Akamai Technologies—to bring you their post-event insights and feedback. Of course ThreatLocker's recap was already captured on the floor and published earlier today. Plus, watch for our closing reflection articles from me Marco Ciappelli and Sean Martin, CISSP!

    Our final floor conversation comes thanks to our friends at Apono 🙏

    Modern enterprises are gambling with security every day. Static permissions, manual approvals, and periodic audits create "privilege creep" that turns every over-privileged account into a potential breach waiting to happen.

    At #BlackHat USA 2025, Ofir Stein from #Apono reveals how to break this dangerous cycle.

    The stakes keep rising:
    • Non-human identities (service accounts, #APIs, #AIagents) retain high-level privileges long after tasks complete
    • Organizations discover risks during audits but lack scalable remediation
    #Business teams need rapid access while security teams battle expanding #attacksurfaces

    Apono's Zero Standing Privilege model:
    • Removes ALL permanent access by default
    • Grants access dynamically based on business context
    • Automatically revokes permissions when tasks complete
    • Works for both human AND non-human identities
    • Integrates with existing #identity providers—no rip and replace

    Key capabilities:
    • Context-based policy management aligned with business objectives
    • Continuous discovery of identities, privileges
    • Automated remediation of unnecessary privileges
    • Real-time anomaly detection feeding #SOC workflows
    • Scalable across centralized and decentralized environments

    The result?
    Engineers gain control over their access (building trust), security teams maintain tight governance, and organizations can finally stop betting their security on standing privileges.

    📺 Watch the video: youtu.be/ciBsH84PVQU

    🎧 Listen to the podcast: brand-stories-podcast.simpleca

    📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about Apono: itspm.ag/apono-1034

    ✦ Catch more stories from Apono: itspmagazine.com/directory/apo

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #IdentityManagement #ZeroTrust #AccessControl #BlackHatUSA #BHUSA25 #PrivilegeManagement #IAM #SecurityAutomation #NonHumanIdentities

  5. 🎯 FINAL POST FROM THE FLOOR: #BlackHatUSA 2025 Coverage!

    Access Roulette: How to Stop Betting Your Security on Standing Privileges

    This wraps up our on-location content from Las Vegas!

    Next week we'll reconnect with our main event sponsors— BLACKCLOAK, Dropzone AI, Stellar Cyber, and Akamai Technologies—to bring you their post-event insights and feedback. Of course ThreatLocker's recap was already captured on the floor and published earlier today. Plus, watch for our closing reflection articles from me Marco Ciappelli and Sean Martin, CISSP!

    Our final floor conversation comes thanks to our friends at Apono 🙏

    Modern enterprises are gambling with security every day. Static permissions, manual approvals, and periodic audits create "privilege creep" that turns every over-privileged account into a potential breach waiting to happen.

    At #BlackHat USA 2025, Ofir Stein from #Apono reveals how to break this dangerous cycle.

    The stakes keep rising:
    • Non-human identities (service accounts, #APIs, #AIagents) retain high-level privileges long after tasks complete
    • Organizations discover risks during audits but lack scalable remediation
    #Business teams need rapid access while security teams battle expanding #attacksurfaces

    Apono's Zero Standing Privilege model:
    • Removes ALL permanent access by default
    • Grants access dynamically based on business context
    • Automatically revokes permissions when tasks complete
    • Works for both human AND non-human identities
    • Integrates with existing #identity providers—no rip and replace

    Key capabilities:
    • Context-based policy management aligned with business objectives
    • Continuous discovery of identities, privileges
    • Automated remediation of unnecessary privileges
    • Real-time anomaly detection feeding #SOC workflows
    • Scalable across centralized and decentralized environments

    The result?
    Engineers gain control over their access (building trust), security teams maintain tight governance, and organizations can finally stop betting their security on standing privileges.

    📺 Watch the video: youtu.be/ciBsH84PVQU

    🎧 Listen to the podcast: brand-stories-podcast.simpleca

    📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about Apono: itspm.ag/apono-1034

    ✦ Catch more stories from Apono: itspmagazine.com/directory/apo

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #IdentityManagement #ZeroTrust #AccessControl #BlackHatUSA #BHUSA25 #PrivilegeManagement #IAM #SecurityAutomation #NonHumanIdentities

  6. 🎯 FINAL POST FROM THE FLOOR: #BlackHatUSA 2025 Coverage!

    Access Roulette: How to Stop Betting Your Security on Standing Privileges

    This wraps up our on-location content from Las Vegas!

    Next week we'll reconnect with our main event sponsors— BLACKCLOAK, Dropzone AI, Stellar Cyber, and Akamai Technologies—to bring you their post-event insights and feedback. Of course ThreatLocker's recap was already captured on the floor and published earlier today. Plus, watch for our closing reflection articles from me Marco Ciappelli and Sean Martin, CISSP!

    Our final floor conversation comes thanks to our friends at Apono 🙏

    Modern enterprises are gambling with security every day. Static permissions, manual approvals, and periodic audits create "privilege creep" that turns every over-privileged account into a potential breach waiting to happen.

    At #BlackHat USA 2025, Ofir Stein from #Apono reveals how to break this dangerous cycle.

    The stakes keep rising:
    • Non-human identities (service accounts, #APIs, #AIagents) retain high-level privileges long after tasks complete
    • Organizations discover risks during audits but lack scalable remediation
    #Business teams need rapid access while security teams battle expanding #attacksurfaces

    Apono's Zero Standing Privilege model:
    • Removes ALL permanent access by default
    • Grants access dynamically based on business context
    • Automatically revokes permissions when tasks complete
    • Works for both human AND non-human identities
    • Integrates with existing #identity providers—no rip and replace

    Key capabilities:
    • Context-based policy management aligned with business objectives
    • Continuous discovery of identities, privileges
    • Automated remediation of unnecessary privileges
    • Real-time anomaly detection feeding #SOC workflows
    • Scalable across centralized and decentralized environments

    The result?
    Engineers gain control over their access (building trust), security teams maintain tight governance, and organizations can finally stop betting their security on standing privileges.

    📺 Watch the video: youtu.be/ciBsH84PVQU

    🎧 Listen to the podcast: brand-stories-podcast.simpleca

    📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about Apono: itspm.ag/apono-1034

    ✦ Catch more stories from Apono: itspmagazine.com/directory/apo

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #IdentityManagement #ZeroTrust #AccessControl #BlackHatUSA #BHUSA25 #PrivilegeManagement #IAM #SecurityAutomation #NonHumanIdentities