Non-Human Identity

Learn latest technology and knowledge

workload identity

Securing the IoT Edge: Workload Identity Bootstrapping for a Zero-Trust Future

Explore how workload identity bootstrapping secures IoT devices and data, enabling zero-trust security at the edge. Learn about challenges, solutions, and best practices.

12 min read
Read full article
certificate pinning

Securing Non-Human Identities: A Guide to Certificate Pinning Strategies

Explore certificate pinning strategies to secure non-human identities (NHIs), machine identities, and workload identities. Learn implementation best practices, benefits, and limitations.

12 min read
Read full article
machine identity

Securing Workloads with Immutable Machine Identities

Explore the concept of immutable machine identities, their benefits in securing non-human workloads, and how they contribute to a robust zero-trust security posture.

By Lalit Choda 13 min read
Read full article
Hardware Root of Trust

Securing Non-Human Identities with Hardware-Rooted Trust

Explore how hardware-rooted identity enhances the security of non-human identities (NHIs) by establishing a solid foundation of trust at the hardware level. Learn about its benefits, implementation, and role in zero-trust architectures.

12 min read
Read full article
federated IoT device management

Securing the IoT Edge: Federated Device Management with Non-Human Identities

Discover how federated device management, coupled with robust Non-Human Identity (NHI) strategies, fortifies IoT security at the edge. Learn to mitigate risks and ensure compliance.

10 min read
Read full article
OPA

Automated Policy Enforcement for Non-Human Identities with OPA

Learn how to use Open Policy Agent (OPA) to automate policy enforcement for non-human identities (NHIs), improving security and compliance.

By Lalit Choda 11 min read
Read full article
workload isolation

Hardware-Enforced Workload Isolation: Securing Non-Human Identities

Explore how hardware-enforced workload isolation protects Non-Human Identities (NHIs) from evolving security threats, ensuring robust machine identity management.

12 min read
Read full article
ephemeral secrets

Ephemeral Workload Secrets: A CISO's Guide to Securing Non-Human Identities

Learn how ephemeral secrets enhance workload security and Non-Human Identity management. A CISO's guide to implementing short-lived credentials.

By Lalit Choda 12 min read
Read full article
federated identity

Securing the Edge: Federated Identity for Non-Human Identities

Explore federated identity solutions for securing edge devices within Non-Human Identity (NHI) frameworks, addressing authentication, authorization, and management challenges. Learn how to implement robust security for your edge infrastructure.

By Lalit Choda 13 min read
Read full article
Prev
11 / 29
Next