Author: Dan Kaplan

Workforce and customer agents may rely on similar identity infrastructure, but the trust models, access patterns, and security risks behind them differ significantly.
Static access rules fail in dynamic MCP environments. Context-based access control evaluates identity, context and resources in real time.
Secrets managers store credentials but can’t close the access gaps that multicloud workloads and AI agents create. Five alternatives can.
Non-human identities outnumber human users 144 to 1, yet most security programs overlook them. The OWASP NHI Top 10 maps the risks.
Hardcoded credentials and shared tokens give attackers ongoing access. Dynamic authorization replaces them with real-time decisions.
Two layers protect cloud-native apps: Workload IAM secures machine identity and API security inspects request traffic. Most teams need both.
An agent behaved like a true insider threat. Unmanaged API keys made those mistakes devastatingly consequential. Both can be true at the same time.
Modern infrastructure depends on keys: encryption and access. They’re not the same, and treating them the same quietly introduces risk.
The 2025 Verizon DBIR confirmed what security teams already suspect: credential theft is outpacing the defenses most organizations have in place.
Workload identity proves who a workload is. Workload access management controls what it can do. Learn why separating them is critical for zero trust.