Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding non-human identity management: Lessons from a PeerSpot One Identity use case

The management of non-human identities (NHI) presents unique challenges that many identity and access management professionals are still learning to navigate. Service accounts, provisioned accounts, and automated system credentials require governance approaches that differ significantly from traditional user management.

NIS2 and your admin accounts: Are you ready?

The NIS2 Directive (NIS2) is now in effect, but some organizations still haven’t taken action – risking a sharp reckoning as the directive marks a major shift in compliance requirements. Compared to other cybersecurity legislation, NIS2 is less about ticking compliance boxes and more of a ground-up rethink of an organization’s entire security posture, especially when it comes to privileged access. We’ve seen this before with GDPR.

Managing Microsoft Teams the right way: Balancing freedom and control

Microsoft Teams has become the standard tool for digital collaboration in companies, public institutions and organizations alike. The platform offers all the functions modern teams need: Chat, meetings, file storage, project collaboration and more – fundamentally changing the way we work together across states and countries. But despite all the enthusiasm, Teams is not without its drawbacks – especially when used without proper control.

Top 7 Privileged Access Management Solutions

Summary: Privileged Access Management (PAM) is essential to securing today’s complex IT environments, as organizations rapidly adopt multi-cloud infrastructures, DevOps practices and hybrid work models. Yet, complexity remains a major barrier – 68% of IT leaders say their current PAM solution includes unnecessary features they rarely use.

Apono Releases MCP Server for End Users

We’re excited to announce the launch of our MCP server for end users, designed to boost engineering productivity while keeping security strong. Engineers often know exactly what they need to do—deploy to a new environment, spin up a workload, investigate logs—but not which permissions translate into those tasks. That leads to two common problems: The result is wasted time, frustrated teams, and an inflated attack surface from unnecessary standing privileges.

Seven Best Practices for Privileged Access Management

Privileged accounts are high-value targets, and without the right controls, they can become your biggest security risk. In this video, we break down seven best practices for Privileged Access Management (PAM) that help protect sensitive systems, enforce least privilege and reduce the chances of unauthorized access.

Why Reducing Risk from Non-Human Identities Shouldn't Break Your Infrastructure

Modern enterprises run on automation. But behind every line of code deploying infrastructure, moving data, or triggering workflows is something often overlooked: a non-human identity (NHI). These NHIs—service accounts, machine credentials, API tokens, CI/CD integrations—outnumber human users by orders of magnitude. And they’re everywhere. Yet in too many organizations, they’re still unmanaged, invisible, and dangerously overprivileged.

Beyond the Drift Breach: Securing Non-Human Identities with Zero Standing Privileges

The Drift OAuth breach didn’t just expose one SaaS vendor — it exposed a systemic blind spot: the sprawling, ungoverned world of Non-Human Identities. In case you missed it, in August 2025, attackers from UNC6395 exploited compromised OAuth tokens from Salesloft’s Drift integration—an AI chat tool—to access and exfiltrate data from Salesforce, including credentials like AWS keys and Snowflake tokens.

Safeguard: Using the double-edged sword of AI for good

Examine the function of AI in security tools, and how this double-edged sword can be used for good or ill in the cybersecurity sphere. Plus, see its integration into an identity fabric and get a glimpse into its responsible use – paired with the human element – in One Identity Safeguard.

7 factors to consider before deciding the right PAM strategy for your enterprise

Over the years, privileged access management has evolved from a nice-to-have component of identity security into a critical business necessity. Whether you're looking to adopt a PAM strategy for the first time or evaluating alternatives to your current setup, selecting the right approach for your enterprise requires careful consideration. Join Ganesh, Global Head of Support Services at ManageEngine, to explore 7 key factors to consider before deciding on the best PAM strategy for your enterprise.