Author: Dan Kaplan

A project to improve test visibility meant using Aembit the same way customers do, in a real deployment environment where software runs unattended and requires trusted access to external services.
Traditional static access control is inadequate for dynamic MCP server environments. Context-Based Access Control (CBAC) provides superior security by evaluating identity, context, and resource in real-time.
The exposure demonstrates how ordinary errors can reveal internal credentials and how stronger limits on scope and lifespan can contain the impact.
These four architectural patterns reveal how AI agents differ fundamentally from traditional workloads.
From Coca-Cola to Campbell Soup, Renee Guttmann knows what lasts as security changes.
The Model Context Protocol (MCP), developed by Anthropic, standardizes how AI agents interact with external tools and data.
Secrets sprawl forces developers into constant rework while leaving organizations exposed to the exact security risks they’re trying to prevent.
The incident shows how repositories double as inadvertent credential stores, extending risk from vendors into customer environments.
From rule-based chatbots to autonomous agentic AI, we’ve come a long way in past three decades.
Credentialitis isn’t just a clever name. It’s a real condition plaguing modern IT teams. Dr. Seymour Keys is here to walk you through the symptoms, the screening, and the treatment.