{"id":314,"date":"2025-05-27T11:00:00","date_gmt":"2025-05-27T11:00:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=314"},"modified":"2025-05-27T11:00:00","modified_gmt":"2025-05-27T11:00:00","slug":"ai-agents-and-the-non%e2%80%91human-identity-crisis-how-to-deploy-ai-more-securely-at-scale","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=314","title":{"rendered":"AI Agents and the Non\u2011Human Identity Crisis: How to Deploy AI\u202fMore Securely\u202fat\u202fScale"},"content":{"rendered":"<p>Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub\u202fCopilot\u2019s code completions to chatbots that mine internal knowledge bases for instant answers. Each new agent must authenticate to other services, quietly swelling the population of non\u2011human identities (NHIs) across corporate clouds.<br \/>\nThat population is already overwhelming the enterprise: many companies<\/p>","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub\u202fCopilot\u2019s code completions to chatbots that mine internal knowledge bases for instant answers. Each new agent must authenticate to&hellip;<\/p>\n","protected":false},"author":1,"featured_media":315,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-314","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=314"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/314\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/315"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}