Apr 16, 2026 • [email protected] (The Hacker News)
[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment
This webinar highlights non-human identities as the leading cause of cloud breaches in 2024, responsible for 68% of incidents—surpassing traditional vectors...
Executive Summary
This webinar highlights non-human identities as the leading cause of cloud breaches in 2024, responsible for 68% of incidents—surpassing traditional vectors like phishing and weak passwords. Organizations maintain 40-50 automated credentials per employee, including service accounts, API tokens, AI agent connections, and OAuth grants. When projects conclude or employees depart, these credentials often become orphaned and unmonitored, creating significant attack surfaces. The primary risk stems from unmanaged service accounts and forgotten API keys that attackers exploit for lateral movement and data exfiltration. Mitigation requires continuous discovery, lifecycle management, and monitoring of non-human identities across cloud environments.
Summary
In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials: service accounts, API tokens, AI agent connections, andOAuth grants. When projects end or employees leave, most
Published Analysis
This webinar highlights non-human identities as the leading cause of cloud breaches in 2024, responsible for 68% of incidents—surpassing traditional vectors like phishing and weak passwords. Organizations maintain 40-50 automated credentials per employee, including service accounts, API tokens, AI agent connections, and OAuth grants. When projects conclude or employees depart, these credentials often become orphaned and unmonitored, creating significant attack surfaces. The primary risk stems from unmanaged service accounts and forgotten API keys that attackers exploit for lateral movement and data exfiltration. Mitigation requires continuous discovery, lifecycle management, and monitoring of non-human identities across cloud environments. In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials: service accounts, API tokens, AI agent connections, andOAuth grants. When projects end or employees leave, most In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials: service accounts, API tokens, AI agent connections, andOAuth grants. When projects end or employees leave, most