Mastering Identity Security with NIST CSF: A Practical Guide for IAM Pros

TL;DR If you鈥檙e leading or supporting an Identity and Access Management (IAM) program, you鈥檙e already touching all five functions of the NIST Cybersecurity Framework (CSF)鈥攜ou just may not be thinking of it that way. This post breaks down how each function of the NIST CSF maps directly to your identity lifecycle, from provisioning to detection to post-breach recovery. 馃 Background: Why NIST CSF Still Matters The NIST Cybersecurity Framework (CSF) remains a go-to model for organizations aiming to assess and improve their security posture....

June 11, 2025 路 3 min 路 Jay Klinkowsky

Handling Enhanced Non-Human Identities (NHIs) in 2025: Risks, Signals, and Safeguards

TL;DR In 2025, non-human identities (NHIs)鈥攍ike bots, service accounts, and automation agents鈥攁re no longer passive infrastructure components. They can now request access, trigger workflows, and even be AI-augmented. That makes them riskier than ever. This post breaks down how to spot bad practices, apply controls, and align your IAM strategy to handle NHIs like first-class identities. 馃 Background: What Are Enhanced NHIs? Traditionally, non-human identities were limited to API keys or service accounts performing narrow tasks....

June 8, 2025 路 2 min 路 Jay Klinkowsky