Archives

  1. The AI Agent Problem Nobody’s Talking About: Privileged Access for Non-Human Workers

    The AI Agent Problem Nobody’s Talking About: Privileged Access for Non-Human Workers Every organization rushing to deploy AI agents is about to run into a problem that looks familiar but is actually something new. At first glance, this appears to be the same old mistake of providing users more access than required. However, upon closer…

  2. AI agents are forcing a reckoning with identity and control

    This blog was originally published here. Most organizations never planned for AI to start making real decisions. They started with simple helpers. An agent answered basic questions or generated small automations so teams could avoid opening another IT ticket. It felt harmless. But as these agents become more capable and more autonomous, they begin operating…

  3. Beneath the AI iceberg: The forces reshaping work and security

    This blog was originally published here. In conversations about AI, there’s a tendency to treat the future like a horizon we’re walking toward, always somewhere ahead, always a question of when. But if we look closely, the forces reshaping work, identity, and security beneath the surface are far more consequential than most people realize. More importantly,…

  4. Azure AI Studio and Azure OpenAI

    The rapid evolution of AI, particularly with powerful platforms like Azure AI Studio and Azure OpenAI, presents an exciting frontier for innovation. However, as I’ve explored in previous posts on Google Vertex and AWS Bedrock, this new landscape also introduces a complex web of identity and access management (IAM) challenges that security and identity teams…

  5. CIO POV: What Am I Actually Supposed to Do with Agentic AI?

    This blog was originally published here. For every enterprise CISO in the world right now, the burning question isn’t about cloud, TPRM, or internal threats. It’s about how to securely and responsibly adopt AI—specifically, agentic AI, the buzziest of today’s AI buzzwords. There’s no shortage of stats on skyrocketing adoption trends. Consider EY’s recent Technology Pulse Poll,…

  6. AI Is Emerging as the New Enterprise Middleware

    In the 1990s, middleware was the muscle that made enterprise computing truly scalable. Before middleware, applications communicated with databases and back-end services directly using drivers like ODBC (Open Database Connectivity) or native SQL calls. This was simple but brittle, used shared secrets, and riddled with risks. It required developers to write custom code for every…

  7. The Rise of Agentic AI Security

    Here at IDSA, we have the pleasure of hosting the second annual NHIcon by member company Aembit. You will hear more from us on this as we get into the new year. For now, let’s give you a sneak peek of some of what you will see at NHIcon 2026 on January 27, 2026. For…

  8. Self Assessment: Modern Access Management Maturity

    To conclude this 5 part series on the importance of comprehensive and deliberate NHI governance, we are pleased to share this self assessment framework to help organizations understand where they are in their access management maturity journey. In case you missed it, here’s what we’ve covered so far: 1. Outnumbered and underprotected: the hidden risk…

  9. Close the NHI Governance Gap

    We’ve spent the better part of the last decade tightening our grip on workforce authentication. SSO is widespread. MFA is table stakes. Access reviews, offboarding workflows, and role-based policies are now standard practice. It took time and iteration, but we got there.  Now it’s time to apply that same rigor to machine identities. The service…

  10. From Chatbots to Agents: The Evolution Toward Agentic AI

    The chatbot that once asked “Press 1 for billing” can now autonomously process your refund, update your account, and schedule a follow-up call. What we’re witnessing is the fourth major evolution in AI-human interaction, from rigid rule-following systems to autonomous agents that can reason, adapt, and take action across complex workflows. This progression from rule-based…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.