workloads

What Kind of Identity Should Your AI Agent Have?
7 min readAI agents don’t neatly fit into your IAM chart. They switch roles, borrow authority, and rewrite what identity means at runtime. Here's what that means for you. The post What ...

MCP, OAuth 2.1, PKCE, and the Future of AI Authorization
6 min readThe MCP authorization spec sets a new standard for securing non-human AI agents – with lessons for anyone building autonomous, scalable systems. The post MCP, OAuth 2.1, PKCE, and the ...

How to Unite Developers, DevOps, and Security Without Slowing Down
5 min readBuilders and protectors don’t have to clash – they just need a common path. The post How to Unite Developers, DevOps, and Security Without Slowing Down appeared first on Aembit ...

Self-Assembling AI and the Security Gaps It Leaves Behind
5 min readInstead of running static workflows, agents are building the system for you, deciding how to connect tools and take action on the fly. The post Self-Assembling AI and the Security ...

KuppingerCole Names Aembit a “Rising Star” for Non-Human IAM
2 min readAs machine-to-machine communication eclipses human access, Aembit's secretless approach to non-human identity is gaining industry recognition. The post KuppingerCole Names Aembit a “Rising Star” for Non-Human IAM appeared first on ...

Inside IETF Bangkok: Shaping the Future of Workload Identity and Access Management
4 min readHow my week went exploring the emerging WIMSE standard and the meticulous work shaping secure, cross-domain workload interactions. The post Inside IETF Bangkok: Shaping the Future of Workload Identity and ...

Aembit Introduces Microsoft Azure Entra ID Workload Identity Federation (WIF) Support
5 min readNon-human identities can now access Azure resources securely, without hardcoded credentials or custom code. The post Aembit Introduces Microsoft Azure Entra ID Workload Identity Federation (WIF) Support appeared first on ...

OWASP’s Top Security Risks for Non-Human Identities and How to Address Them
5 min readWe deep dive into the first-ever NHI threat list – exploring each risk, real-world breaches that prove the threat is real, and how to defend against them. The post OWASP’s ...

Protecting the Soft Underbelly of Your Organization
Organizations are waking up to the sad truth that their workloads are often a weakly protected, and underappreciated aspect of their IT infrastructure, and this problem is growing worse by the day. ...

Aembit Adds AWS Workload Identity Federation (WIF) Support
4 min readThe new capability enables granular access without having to manage secrets. The post Aembit Adds AWS Workload Identity Federation (WIF) Support appeared first on Aembit ...