{"id":522,"date":"2025-06-12T13:06:00","date_gmt":"2025-06-12T13:06:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=522"},"modified":"2025-06-12T13:06:00","modified_gmt":"2025-06-12T13:06:00","slug":"ai-agents-run-on-secret-accounts-learn-how-to-secure-them-in-this-webinar","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=522","title":{"rendered":"AI Agents Run on Secret Accounts \u2014 Learn How to Secure Them in This Webinar"},"content":{"rendered":"<p>AI is changing everything \u2014 from how we code, to how we sell, to how we secure. But while most conversations focus on what AI can do, this one focuses on what AI can break \u2014 if you\u2019re not paying attention.<br \/>\nBehind every AI agent, chatbot, or automation script lies a growing number of non-human identities \u2014 API keys, service accounts, OAuth tokens \u2014 silently operating in the background.<br \/>\nAnd here\u2019s<\/p>","protected":false},"excerpt":{"rendered":"<p>AI is changing everything \u2014 from how we code, to how we sell, to how we secure. But while most conversations focus on what AI can do, this one focuses&hellip;<\/p>\n","protected":false},"author":1,"featured_media":523,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-522","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=522"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/522\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/523"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}