Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
TV & Film
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts125/v4/29/05/b3/2905b3dc-c245-6649-b8c3-1b5c68d6fe60/mza_17118105725458633593.jpg/600x600bb.jpg
KuppingerCole Analysts
KuppingerCole Analysts
371 episodes
4 days ago
KuppingerCole Analysts AG is an international, independent analyst organization offering technology research, neutral advice and events in Identity Management, Cybersecurity and Artificial Intelligence.
Show more...
Technology
RSS
All content for KuppingerCole Analysts is the property of KuppingerCole Analysts and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
KuppingerCole Analysts AG is an international, independent analyst organization offering technology research, neutral advice and events in Identity Management, Cybersecurity and Artificial Intelligence.
Show more...
Technology
https://media.kuppingercole.com/media/square/analystchat264.jpg
Analyst Chat #264: Persistent Identity, Ephemeral Secrets - Workload Identities in the Age of AI
KuppingerCole Analysts
22 minutes 27 seconds
3 months ago
Analyst Chat #264: Persistent Identity, Ephemeral Secrets - Workload Identities in the Age of AI

In this episode of the KuppingerCole Analyst Chat, Martin Kuppinger joins Matthias Reinwarth to dive deep into one of the most overlooked but critical areas in identity and security: non-human identities (NHI) and workload secrets. As cloud-native development and AI-driven workloads grow, so does the complexity of managing machine identities. With AWS now supporting long-lived API keys for generative AI, this episode explores why that's a risky move — and what a modern, secure, and developer-friendly alternative looks like.

In this episode, you'll learn:

  • Why workload identities must be treated as privileged
  • How long-lived secrets expand your attack surface
  • Why “balancing convenience vs. security” is a false choice
  • How to apply ephemeral secrets and ITDR signals
  • The role of SPIFFE/SPIRE, policy-as-code (OPA), and automation
  • Why developers shouldn’t own security — and what IAM must do instead
  • How attackers use AI to hunt your leaked secrets
  • What organizations must do to secure NHI at scale

Key takeaway: Security must be built around short-lived secrets, automation, and clear separation between identity, secrets, and entitlements — especially for workloads and AI agents.

KuppingerCole Analysts
KuppingerCole Analysts AG is an international, independent analyst organization offering technology research, neutral advice and events in Identity Management, Cybersecurity and Artificial Intelligence.