AI in IAM: Why Human-in-the-Loop Still Matters

TL;DR AI brings speed, scale, and intelligence to Identity and Access Management (IAM). But real-world breaches, compliance rules, and business complexity prove a critical truth: without a human-in-the-loop (HiTL), automation introduces unacceptable risks. This guide covers how AI is transforming IAM, what can go wrong, real-world incidents, case studies, key compliance requirements (SOX, HIPAA, GDPR, NIST, and more), and a downloadable mapping document for your security program. 1. Introduction: The New Age of IAM Automation Identity and Access Management (IAM) is now at the crossroads of AI, automation, and Zero Trust....

June 12, 2025 · 5 min · Jay Klinkowsky

IAM 101: Multi-Factor Authentication – Why MFA Still Matters in 2025

TL;DR Multi-Factor Authentication (MFA) remains one of the most effective and underutilized defenses in modern cybersecurity. Despite being widely available, it’s often poorly implemented or misunderstood. In this post, we break down: Why MFA is still essential in 2025 Common MFA methods (and which to avoid) How attackers are bypassing MFA Best practices for enterprise adoption 🔍 Background Fifteen years into IAM, I’ve watched the industry shift from passwords to push prompts, biometrics, and passkeys....

June 11, 2025 · 4 min · Jay Klinkowsky

Mastering Identity Security with NIST CSF: A Practical Guide for IAM Pros

TL;DR If you’re leading or supporting an Identity and Access Management (IAM) program, you’re already touching all five functions of the NIST Cybersecurity Framework (CSF)—you just may not be thinking of it that way. This post breaks down how each function of the NIST CSF maps directly to your identity lifecycle, from provisioning to detection to post-breach recovery. 🧠 Background: Why NIST CSF Still Matters The NIST Cybersecurity Framework (CSF) remains a go-to model for organizations aiming to assess and improve their security posture....

June 11, 2025 · 3 min · Jay Klinkowsky

Handling Enhanced Non-Human Identities (NHIs) in 2025: Risks, Signals, and Safeguards

TL;DR In 2025, non-human identities (NHIs)—like bots, service accounts, and automation agents—are no longer passive infrastructure components. They can now request access, trigger workflows, and even be AI-augmented. That makes them riskier than ever. This post breaks down how to spot bad practices, apply controls, and align your IAM strategy to handle NHIs like first-class identities. 🧠 Background: What Are Enhanced NHIs? Traditionally, non-human identities were limited to API keys or service accounts performing narrow tasks....

June 8, 2025 · 2 min · Jay Klinkowsky

IAM 101: Single Sign-On (SSO) – The Magic of One Login

TL;DR Single Sign-On (SSO) allows users to access multiple applications with just one login. It’s a cornerstone of modern IAM strategy—enhancing user experience, reducing password fatigue, and boosting productivity. But SSO done wrong can centralize risk. In this post, we cover: How SSO works (and where it fits) Benefits for security, UX, and operations SAML, OIDC, and modern federation protocols Common pitfalls and how to avoid them 🔍 Background Back in the early 2010s, most companies I worked with had users juggling 5–10 logins daily....

June 4, 2025 · 4 min · Jay Klinkowsky

IAM 101: Lifecycle Management – Joiners, Movers, and Leavers Done Right

IAM 101: Lifecycle Management – Joiners, Movers, and Leavers Done Right TL;DR Identity Lifecycle Management (ILM) governs the entire digital identity journey—from onboarding new employees to adjusting access when they change roles, to securely deactivating accounts when they leave. This “Joiners, Movers, and Leavers” process is critical to both security and operational efficiency. When mismanaged, it leads to overprovisioned users, dormant accounts, compliance failures, and insider threats. This article breaks down the core lifecycle stages, shows how automation can fix the chaos, and offers practical strategies drawn from real enterprise deployments....

May 28, 2025 · 5 min · Jay Klinkowsky

Common IAM Misconfigurations in 2025 and How to Fix Them

Introduction Identity and Access Management (IAM) is the foundation of organizational security. Yet, even the most well-intentioned IAM deployments are riddled with misconfigurations that open dangerous backdoors for attackers. In today’s cloud-first and hybrid work environments, a single oversight in IAM can lead to data breaches, compliance violations, and business disruptions. In this article, we’ll walk through the most common IAM misconfigurations—and how to avoid them using practical strategies, with real-world examples to highlight the risks....

April 30, 2025 · 4 min · Jay Klinkowsky

Responsible Use of AI: Why Checks & Balances Matter More Than Ever

Introduction In the first part of this series, we examined the mounting risks that come with using AI in financial documentation and identity workflows. From deepfake-enabled fraud to AI-generated receipts that are indistinguishable from real ones, it’s clear that relying too heavily on automation can undermine trust, integrity, and security. In this second post, we shift our focus to solutions. We’ll explore how to establish safeguards, maintain accountability, and implement the Zero Trust Human philosophy to ensure AI enhances rather than harms our digital ecosystems....

April 23, 2025 · 12 min · Jay Klinkowsky

The Hidden Dangers of AI in Receipts and Identity Workflows

From self-generating invoices to automated ID verification, AI is quickly becoming a foundational tool in business operations, security protocols, and digital transactions. Organizations use AI to process documents, detect anomalies, and streamline workflows—boosting speed and reducing human error. But there’s a darker side. When these systems are deployed without adequate oversight, they can be exploited by threat actors or produce flawed outcomes at scale. This blog post explores how AI-generated receipts and identity automation can lead to data fraud, compliance violations, and systemic vulnerabilities—especially in the absence of human checks and balances....

April 16, 2025 · 8 min · Jay Klinkowsky

AI and PII: The Privacy Risks You Can't Ignore in 2025

In today’s digital age, artificial intelligence (AI) has become increasingly mainstream, shaping everything from how we search online to how we interact with technology daily. However, as AI grows more prevalent, concerns about privacy, particularly regarding personally identifiable information (PII), have emerged as critical issues that users must understand. Mainstream AI tools, such as conversational AI assistants (e.g., ChatGPT, Google Bard) and generative AI platforms (e.g., Midjourney, DALL-E), rely heavily on data gathered from the internet....

March 30, 2025 · 4 min · Jay Klinkowsky