{"id":2219,"date":"2024-10-03T16:12:16","date_gmt":"2024-10-03T16:12:16","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/10\/03\/the-secret-weakness-execs-are-overlooking-non-human-identities\/"},"modified":"2024-10-03T16:12:16","modified_gmt":"2024-10-03T16:12:16","slug":"the-secret-weakness-execs-are-overlooking-non-human-identities","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/10\/03\/the-secret-weakness-execs-are-overlooking-non-human-identities\/","title":{"rendered":"The Secret Weakness Execs Are Overlooking: Non-Human Identities"},"content":{"rendered":"<p>\u200bFor years, securing a company\u2019s systems was synonymous with securing its \u201cperimeter.\u201d There was what was safe \u201cinside\u201d and the unsafe outside world. We built sturdy firewalls and deployed sophisticated detection systems, confident that keeping the barbarians outside the walls kept our data and systems safe.<br \/>\nThe problem is that we no longer operate within the confines of physical on-prem\u00a0For years, securing a company\u2019s systems was synonymous with securing its \u201cperimeter.\u201d There was what was safe \u201cinside\u201d and the unsafe outside world. We built sturdy firewalls and deployed sophisticated detection systems, confident that keeping the barbarians outside the walls kept our data and systems safe.<br \/>\nThe problem is that we no longer operate within the confines of physical on-prem\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bFor years, securing a company\u2019s systems was synonymous with securing its \u201cperimeter.\u201d There was what was safe \u201cinside\u201d and the unsafe outside world. We built sturdy firewalls and deployed sophisticated detection systems, confident that keeping the barbarians outside the walls kept our data and systems safe. The problem is that we no longer operate within&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/10\/03\/the-secret-weakness-execs-are-overlooking-non-human-identities\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">The Secret Weakness Execs Are Overlooking: Non-Human Identities<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":2220,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2219"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=2219"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2219\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/2220"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=2219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=2219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=2219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}