{"id":4907,"date":"2025-07-15T12:14:32","date_gmt":"2025-07-15T12:14:32","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/07\/15\/securing-agentic-ai-how-to-protect-the-invisible-identity-access\/"},"modified":"2025-07-15T12:14:32","modified_gmt":"2025-07-15T12:14:32","slug":"securing-agentic-ai-how-to-protect-the-invisible-identity-access","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/07\/15\/securing-agentic-ai-how-to-protect-the-invisible-identity-access\/","title":{"rendered":"Securing Agentic AI: How to Protect the Invisible Identity Access"},"content":{"rendered":"<p>\u200bAI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI agent spins up a workflow, it has to authenticate somewhere; often with a high-privilege API key, OAuth token, or service account that defenders can\u2019t easily see. These \u201cinvisible\u201d non-human identities (NHIs) now outnumber human accounts in most cloud environments, and they have\u00a0AI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI agent spins up a workflow, it has to authenticate somewhere; often with a high-privilege API key, OAuth token, or service account that defenders can\u2019t easily see. These \u201cinvisible\u201d non-human identities (NHIs) now outnumber human accounts in most cloud environments, and they have\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bAI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI agent spins up a workflow, it has to authenticate somewhere; often with a high-privilege API key, OAuth token, or service account that defenders can\u2019t easily see. These \u201cinvisible\u201d non-human identities (NHIs) now outnumber human accounts in most cloud&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/07\/15\/securing-agentic-ai-how-to-protect-the-invisible-identity-access\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Securing Agentic AI: How to Protect the Invisible Identity Access<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":4908,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4907"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=4907"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4907\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/4908"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=4907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=4907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=4907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}