Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Nine Seconds to Delete a Database: What the PocketOS Incident Teaches Us About AI Agent Privilege Management

There’s never a good time to lose a production database, but losing one to your own AI coding agent on a Friday afternoon has to rank near the bottom of the list. That’s the backdrop to the PocketOS incident, and it’s the clearest case yet for why AI agent security and intent-based access control belong at the top of every cloud security roadmap this year.

How Zero Standing Privileges Defuses the Shadow AI Agent Problem

As more organizations move past experimentation and start planning real AI agent deployments, the same set of concerns keeps surfacing in our conversations with security teams. Whether the worry is a shadow agent that shows up uninvited or a sanctioned agent going rogue, the questions tend to cluster around control: These are the right questions to be asking, and they share a common answer that’s more concrete than most people expect. AI agents are only as dangerous as the privileges they can reach.

Why you need Active Roles, even if you have IGA

Here are three scenarios I come across frequently with customers of all sizes, in all industries, when discussing Active Roles by One Identity: These situations come from customers on all points of the "identity security maturity" spectrum. Those who have nothing in place or some things in place or an entire stack of fully implemented solutions in every category.

Why 75%+ of Enterprises Admit They Can't Secure Their Non-Human Identities

Security teams are losing the battle to secure non-human identities (NHIs) for one simple reason: machine identities are now created inside the systems that ship software. They appear in CI/CD pipelines, Kubernetes workloads, SaaS integrations, and AI-driven workflows faster than central IAM teams can inventory or review them.

When your most powerful users aren't human: Managing AI and NHIs for compliant privileged access

The identities of the most powerful users and admins in many organizations aren’t people. They’re Non-Human Identities (NHIs). Some of these NHIs execute actions with human configuration and oversight. Others, namely AI agents, can execute high-risk functions at different levels of autonomy. They can perform tasks that range from analyzing data to deploying code, at a volume and velocity far beyond human capabilities.

Top 10 Governance, Risk, and Compliance (GRC) Software Solutions

Governance is breaking. Not because companies care less about risk, but because modern infrastructure moves faster than the controls designed to govern it. In 2026, governance has to keep up with cloud-native architectures, AI adoption, API sprawl, and the explosion of machine identities across production environments.

7 Principles of Zero Trust Identity and Access Management

Many engineering teams treat zero trust as a simple MFA checkbox. They invest in advanced identity providers but still leave environments exposed, with permanent admin roles and manual ticket queues that frustrate developers. Most teams have adopted the language of zero trust without changing how access actually works. They verify identity at login, then leave broad permissions in place long after the task is done.

One Checkbox Away: The Vercel Breach and the Case for Zero Standing Privileges

There’s never a good time to disclose a breach, but days before your IPO has to rank near the bottom of the list. That was the backdrop to the Vercel breach. On Sunday the 19th, the company confirmed that attackers had walked into parts of its internal environment and walked back out with customer API keys. Early reporting focused on the flashy parts: an attacker claiming ties to ShinyHunters, a $2 million BreachForums demand, crypto teams rotating credentials with the IPO roadshow in full swing.

The Hims Data Breach: What Standing Access Costs in Healthcare

Hims & Hers, one of the biggest telehealth platforms in the U.S., just disclosed that millions of customer records were exposed. Not because of some sophisticated exploit, but because a single compromised login had standing access to a connected platform. One identity was all it took. This breach is worth paying attention to not because it’s unusual, but because it’s so ordinary.

Announcing Approval Escalation: Stop Letting Stalled Approvals Block Your Team

Today, we’re introducing Approval Escalation, a new capability in Apono that automatically moves access requests forward when the original approver doesn’t respond in time. Because no one should be stuck waiting seven hours just to do their job.