Non-Human Identity

Learn latest technology and knowledge

federated identity

Securing the Edge: Federated Identity for Non-Human Identities

Explore federated identity solutions for securing edge devices within Non-Human Identity (NHI) frameworks, addressing authentication, authorization, and management challenges. Learn how to implement robust security for your edge infrastructure.

By Lalit Choda 13 min read
Read full article
ephemeral secrets

Ephemeral Workload Secrets: A CISO's Guide to Securing Non-Human Identities

Learn how ephemeral secrets enhance workload security and Non-Human Identity management. A CISO's guide to implementing short-lived credentials.

By Lalit Choda 12 min read
Read full article
machine identity

Machine Identity Boundaries: Defining the Perimeter of Non-Human Access

Explore the concept of machine identity boundaries in Non-Human Identity, workload identity, and machine identity management. Learn how to define and enforce these boundaries for enhanced security.

11 min read
Read full article
Non-Human Identity

Non-Human Identity Exposure: Risks, Realities, and Remediation

Explore the growing threat of Non-Human Identity (NHI) exposure. Learn about the risks, common vulnerabilities, and practical strategies to secure your machine identities.

By Lalit Choda 11 min read
Read full article
workload identity

Workload Identity Diffusion: Extending Trust in Non-Human Identities

Explore workload identity diffusion, its challenges, and solutions for securing non-human identities in distributed environments. Learn about diffusion algorithms and their applications.

By Lalit Choda 10 min read
Read full article
Zero Trust

Securing Microservices with Zero Trust and Non-Human Identity

Implement Zero Trust in microservices with a focus on non-human identity, machine identity, and workload identity for enhanced security.

By Lalit Choda 10 min read
Read full article
workload attestation

Attesting Workload Source Code: Securing Non-Human Identities

Learn how attesting workload source code strengthens Non-Human Identity (NHI) security, ensuring trust and integrity in automated systems.

By Lalit Choda 10 min read
Read full article
serverless functions

Securing Serverless Functions: An Overview of Identity Management

Explore the concept of serverless function identities, their importance in workload security, and how they fit into Non-Human Identity management.

11 min read
Read full article
microservices

Identity Propagation in Microservices: Securing Non-Human Identities

Learn how to securely propagate non-human identities (NHI) across microservices for robust authentication and authorization.

By Lalit Choda 11 min read
Read full article
Prev
12 / 29
Next