{"id":1783,"date":"2025-09-22T11:00:00","date_gmt":"2025-09-22T11:00:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=1783"},"modified":"2025-09-22T11:00:00","modified_gmt":"2025-09-22T11:00:00","slug":"how-to-gain-control-of-ai-agents-and-non-human-identities","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=1783","title":{"rendered":"How to Gain Control of AI Agents and Non-Human Identities"},"content":{"rendered":"<p>We hear this a lot:<br \/>\n\u201cWe\u2019ve got hundreds of service accounts and AI agents running in the background. We didn\u2019t create most of them. We don\u2019t know who owns them. How are we supposed to secure them?\u201d<br \/>\nEvery enterprise today runs on more than users. Behind the scenes, thousands of non-human identities, from service accounts to API tokens to AI agents, access systems, move data, and execute tasks<\/p>","protected":false},"excerpt":{"rendered":"<p>We hear this a lot: \u201cWe\u2019ve got hundreds of service accounts and AI agents running in the background. We didn\u2019t create most of them. We don\u2019t know who owns them.&hellip;<\/p>\n","protected":false},"author":1,"featured_media":1784,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-1783","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/1783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1783"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/1783\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/1784"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}