{"id":5580,"date":"2025-09-22T11:14:08","date_gmt":"2025-09-22T11:14:08","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/09\/22\/how-to-gain-control-of-ai-agents-and-non-human-identities\/"},"modified":"2025-09-22T11:14:08","modified_gmt":"2025-09-22T11:14:08","slug":"how-to-gain-control-of-ai-agents-and-non-human-identities","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/09\/22\/how-to-gain-control-of-ai-agents-and-non-human-identities\/","title":{"rendered":"How to Gain Control of AI Agents and Non-Human Identities"},"content":{"rendered":"<p>\u200bWe hear this a lot:<br \/>\n\u201cWe\u2019ve got hundreds of service accounts and AI agents running in the background. We didn\u2019t create most of them. We don\u2019t know who owns them. How are we supposed to secure them?\u201d<br \/>\nEvery enterprise today runs on more than users. Behind the scenes, thousands of non-human identities, from service accounts to API tokens to AI agents, access systems, move data, and execute tasks\u00a0We hear this a lot:<br \/>\n\u201cWe\u2019ve got hundreds of service accounts and AI agents running in the background. We didn\u2019t create most of them. We don\u2019t know who owns them. How are we supposed to secure them?\u201d<br \/>\nEvery enterprise today runs on more than users. Behind the scenes, thousands of non-human identities, from service accounts to API tokens to AI agents, access systems, move data, and execute tasks\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bWe hear this a lot: \u201cWe\u2019ve got hundreds of service accounts and AI agents running in the background. We didn\u2019t create most of them. We don\u2019t know who owns them. How are we supposed to secure them?\u201d Every enterprise today runs on more than users. Behind the scenes, thousands of non-human identities, from service accounts&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/09\/22\/how-to-gain-control-of-ai-agents-and-non-human-identities\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">How to Gain Control of AI Agents and Non-Human Identities<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":5581,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/5580"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=5580"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/5580\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/5581"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=5580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=5580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=5580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}