Non-Human Identity

Learn latest technology and knowledge

homomorphic encryption

Homomorphic Encryption for Non-Human Identities: Securing Workloads in a Zero-Trust World

Explore how homomorphic encryption enhances the security of Non-Human Identities (NHIs) by enabling computation on encrypted workload data, ensuring data privacy and compliance.

By Lalit Choda 14 min read
Read full article
SBOM

Securing Non-Human Identities with Software Bill of Materials (SBOM)

Learn how Software Bill of Materials (SBOM) can strengthen the security posture of Non-Human Identities (NHIs) by providing transparency and vulnerability management.

By Lalit Choda 11 min read
Read full article
workload identity

Securing Service Meshes with Workload Identity

Learn how workload identity enhances security in service meshes. Explore authentication, authorization, and best practices for non-human identities.

By Lalit Choda 11 min read
Read full article
machine identity observability

Machine Identity Observability: Securing the Non-Human Workforce

Learn how machine identity observability enhances security and reliability by providing deep insights into the behavior of non-human identities.

By Lalit Choda 16 min read
Read full article
non-human identity

Non-Human Identity Threat Modeling: Securing the Machine-to-Machine Landscape

Learn how to threat model non-human identities (NHIs) like service accounts, API keys, and workloads to secure your systems from machine-to-machine attacks.

By Lalit Choda 9 min read
Read full article
DevSecOps

Securing the Machine: DevSecOps for Non-Human Identities

Learn how to implement DevSecOps principles for managing and securing non-human identities (NHIs) or workload identities, reducing risk and improving agility.

By AbdelRahman Magdy 12 min read
Read full article
attestation

Attestation-Based Identity for Non-Human Identities

Explore attestation-based identity for Non-Human Identities (NHIs), including machine and workload identities. Learn how it enhances security and trust.

By Lalit Choda 9 min read
Read full article
workload identity brokering

Workload Identity Brokering: Securing Non-Human Access in the Cloud

Learn about workload identity brokering, a crucial security practice for managing non-human identities in cloud environments. Discover how it enhances Zero Trust by decoupling identity from access.

By Lalit Choda 12 min read
Read full article
CNI security

CNI Security for Workloads: A Non-Human Identity Perspective

Explore CNI security challenges and solutions for workloads, focusing on non-human identity, machine identity, and workload identity in cloud-native environments.

By Lalit Choda 11 min read
Read full article