Author: Dan Kaplan

Details shared by the attacker suggest the intrusion expanded beyond the initial application through permissions that allowed access to dozens of internal credentials.
Traditional IAM was built for predictable workloads. Learn why AI agents demand a new approach to identity, access control, and credential management.
Discover verifiable agentic AI deployments in software, security, IT Ops, and logistics. Learn the essential security, identity, and governance patterns for safe production use.
As agents scale and operate continuously, MCP servers are becoming long-lived access intermediaries, concentrating privilege in ways security teams have already struggled to contain.
Runnable security patterns that examine how agentic behavior expands, drifts, and exceeds intent during everyday use.
A ServiceNow impersonation flaw illustrates how agentic systems turn weak identity assumptions into durable access paths across enterprise environments.
Traditional security models fail to detect compromised service accounts and non-deterministic AI agents, requiring a shift to layered, identity-aware behavioral monitoring.
API keys offer simplicity, but OAuth provides superior security through automatic expiration and granular scopes.
A project to improve test visibility meant using Aembit the same way customers do, in a real deployment environment where software runs unattended and requires trusted access to external services.
True zero trust requires verified identity at every request and eliminating static credentials entirely.