Account Recertification in Depth: Beyond Annual Reviews with Continuous, Event-Driven, and AI-Assisted Governance

TL;DR Annual access reviews alone won’t keep you safe. Real control requires a yin–yang operating model presented in the order you actually work: Yin (Secure AI-Assisted): risk-aware triage, context synthesis, toxic-combination detection, usage-based revocation suggestions, and policy-drift alerts—with human oversight for anything high-impact. Yang (Manual, Human-Led): clear ownership, accountable attestations by managers and app owners, strong evidence trails, and auditable decisions. Design your program around continuous and event-driven recertification—small, frequent, targeted reviews triggered by real changes—not a once-a-year scramble....

October 1, 2025 · 9 min · Jay Klinkowsky

AI as the New Cybercrime Weapon: A 2025 Briefing for IT Leaders

From Passwords to Prompts: The AI Shift in Identity & IT Artificial intelligence (AI) has become a double-edged sword in IT and identity security. On one side, enterprises deploy AI for automation, fraud detection, adaptive authentication, and anomaly detection. On the other, cybercriminals are weaponizing the same tech to supercharge their intrusions. In 2023, U.S. consumers reported over $10 billion in fraud losses — the highest figure ever recorded. Analysts and regulators increasingly attribute this surge to AI-enhanced cybercrime, where phishing emails, romance scams, and business email compromise (BEC) are crafted by generative models....

August 28, 2025 · 7 min · Jay Klinkowsky
AI and automation trends transforming IAM

The Future of IAM: AI & Automation

#The Future of IAM: AI & Automation TL;DR Identity and Access Management (IAM) is evolving fast. AI and automation are moving IAM from static, rules-based controls to adaptive, intelligence-driven systems. Machine learning powers real-time anomaly detection, behavior-based authentication reduces reliance on passwords, and identity orchestration unifies workflows across multi-cloud and legacy systems. But with innovation comes new risks: AI agents, machine identities, and autonomous threats demand fresh governance and continuous monitoring....

August 27, 2025 · 4 min · Everyday Identity