Shadow IT Discovery Through Identity Analytics: Making the Invisible Visible

Shadow IT Discovery Through Identity Analytics: Making the Invisible Visible TL;DR Here’s a fun number: 1,158. That’s how many cloud applications the average enterprise uses. Wanna guess how many IT actually sanctioned? About 35. Do the math—that’s 97% of your cloud services operating completely outside your visibility. 1,158 apps. You’ve sanctioned maybe 30. The rest? Shadow IT. And here’s the thing—you can’t see them with traditional security tools. Your firewall?...

December 15, 2025 · 32 min · Jay Klinkowsky

Managing Non-Human Identities at Scale: The Forgotten Attack Surface

Managing Non-Human Identities at Scale: The Forgotten Attack Surface TL;DR Here’s a fun stat that should keep you up at night: non-human identities outnumber humans 45 to 1 in cloud environments (CyberArk 2024). Forty-five to one. Service accounts, API keys, bots, workload identities—all those machine credentials you barely track? Yeah, they outnumber your employees by almost 50x. And I bet you can’t name even 10% of them. The average enterprise has over 5,000 non-human identities with unclear ownership....

December 2, 2025 · 62 min · Jay Klinkowsky

IAM 101: Why Identity in the Cloud Must Be Your #1 Security Priority for AWS, Azure, and Google

IAM 101: Why Identity in the Cloud Must Be Your #1 Security Priority for AWS, Azure, and Google TL;DR Identity is the real cloud perimeter. As businesses move to AWS, Azure, and Google Cloud, old security assumptions vanish—and identity becomes the #1 target for attackers. This post explains why managing cloud identities (not just passwords!) is the key to surviving in a world of SaaS, hybrid work, and zero trust....

July 16, 2025 · 4 min · Jay Klinkowsky