<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talking Identity</title>
	<atom:link href="https://blog.talkingidentity.com/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.talkingidentity.com</link>
	<description></description>
	<lastBuildDate>Mon, 16 Feb 2026 04:24:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>You Can’t Secure What You Can’t Explain</title>
		<link>https://blog.talkingidentity.com/2026/02/you-cant-secure-what-you-cant-explain.html</link>
		
		<dc:creator><![CDATA[Nishant Kaushik]]></dc:creator>
		<pubDate>Mon, 16 Feb 2026 04:24:00 +0000</pubDate>
				<category><![CDATA[Insight IdM]]></category>
		<category><![CDATA[Continuous Identity]]></category>
		<category><![CDATA[IAM Operations Management]]></category>
		<category><![CDATA[Identity Governance]]></category>
		<category><![CDATA[Identity Observability]]></category>
		<category><![CDATA[Observability]]></category>
		<guid isPermaLink="false">https://blog.talkingidentity.com/?p=2495</guid>

					<description><![CDATA[When Ian mentioned the Sarbanes-Oxley Act in his LinkedIn post sharing the news of SGNL getting acquired by Crowdstrike, it led to a funny exchange between us. It also reminded me of a task I had assigned myself almost 8 months ago. Last summer, I spent quite a bit of time going deeper into how [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>When Ian mentioned the Sarbanes-Oxley Act in <a href="https://www.linkedin.com/posts/iglazer_crowdstrike-to-acquire-sgnl-to-transform-activity-7415035034539192320-XJWO" target="_blank" rel="noreferrer noopener">his LinkedIn post</a> sharing the news of SGNL getting acquired by Crowdstrike, it led to a funny exchange between us. It also reminded me of a task I had assigned myself almost 8 months ago.</p>



<p>Last summer, I spent quite a bit of time going deeper into how the Identity Governance and Administration (IGA) world has evolved since the days I was immersed in it, back in the Thoracle days. It’s not like I wasn’t aware of what had been happening. I watched IAM evolve into IGA, and saw PAM, Zero Trust, and ITDR emerge as platforms and buzzwords. So when I was looking at the identity market in the summer, the question I found myself asking was: Is <em>Identity Observability</em> actually something new, or just IGA repackaged? Looking back, I probably went into this assuming it was mostly marketing. After spending time digging in, and working with my friends at <a href="https://observeid.com/" target="_blank" rel="noreferrer noopener">ObserveID</a>, I realized that there <em>is </em>something real here. Something that addresses a gap many identity teams feel but struggle to articulate.</p>



<h2 class="wp-block-heading">The Limits of the IGA Mental Model</h2>



<p>IGA is fundamentally about <strong>control</strong>. It models identities and entitlements, enforces lifecycle processes, certifies access, and produces evidence for auditors. Simply put, IGA aims to answer questions like:</p>



<ul class="wp-block-list">
<li>Who should have access to what?</li>



<li>How did they get it?</li>



<li>Who approved it?</li>



<li>Does this comply with policy?</li>
</ul>



<p>But, importantly, these questions assume that <strong>the identity system is working as designed</strong>.</p>



<figure class="wp-block-image size-large"><a href="https://blog.talkingidentity.com/wp-content/uploads/2026/02/mental_maze.jpg"><img fetchpriority="high" decoding="async" width="1024" height="602" src="https://blog.talkingidentity.com/wp-content/uploads/2026/02/mental_maze-1024x602.jpg" alt="Abstract image of a mental maze" class="wp-image-2498" srcset="https://blog.talkingidentity.com/wp-content/uploads/2026/02/mental_maze-1024x602.jpg 1024w, https://blog.talkingidentity.com/wp-content/uploads/2026/02/mental_maze-300x176.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2026/02/mental_maze-768x452.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2026/02/mental_maze-1536x903.jpg 1536w, https://blog.talkingidentity.com/wp-content/uploads/2026/02/mental_maze.jpg 2000w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>Anyone who has operated IGA in the real world knows that’s often not the case. Most identity failures don’t come from missing policies. They come from:</p>



<ul class="wp-block-list">
<li>Broken joiner/mover/leaver flows</li>



<li>Stale or incorrect attributes</li>



<li>Orphaned accounts</li>



<li>Shadow admins and service accounts</li>



<li>Failed deprovisioning</li>



<li>Controls that “exist” but don’t actually fire</li>
</ul>



<p>Traditional IGA is very good at describing and executing the <strong>intended state</strong> of identity. Where it falls short is when an organization wants to continuously validate the <strong>actual state</strong>. That gap is where Identity Observability shows up.</p>



<h2 class="wp-block-heading">What Identity Observability Actually Is</h2>



<p>Identity observability applies observability principles – telemetry, events, metrics, correlation – to identity systems. Instead of just asking:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“Who has access?”</p>
</blockquote>



<p>It asks:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“What is actually happening across our identity stack right now, and does it match what we think is happening?”</p>
</blockquote>



<p>Conceptually, it’s an <strong>operational analytics and assurance layer</strong> for identity. It goes beyond configuration to look at runtime behavior. It evaluates data quality and control drift, and surfaces rare or risky access paths. Most importantly, it explains <em>why</em> identity decisions occurred. In other words, the essential outcome here is <strong>explainability</strong>.</p>



<figure class="wp-block-image size-large"><a href="https://blog.talkingidentity.com/wp-content/uploads/2026/02/explaining_things.jpg"><img decoding="async" width="1024" height="550" src="https://blog.talkingidentity.com/wp-content/uploads/2026/02/explaining_things-1024x550.jpg" alt="Image of person explaining mathematical things on a blackboard." class="wp-image-2500" srcset="https://blog.talkingidentity.com/wp-content/uploads/2026/02/explaining_things-1024x550.jpg 1024w, https://blog.talkingidentity.com/wp-content/uploads/2026/02/explaining_things-300x161.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2026/02/explaining_things-768x412.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2026/02/explaining_things-1536x825.jpg 1536w, https://blog.talkingidentity.com/wp-content/uploads/2026/02/explaining_things.jpg 2000w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>This clicked into place for me when I realized that this wasn’t some new invention. Identity was just catching up to a shift that had already been happening across IT. Infrastructure and application teams, cloud platforms, security operations – each of these domains had shifted from monitoring to observability, reflecting a realization that configuration visibility, static dashboards, and periodic reports just aren’t enough. Systems have become too distributed, too dynamic, and too interconnected. Observability became necessary because modern systems required continuous validation of behavior, not just confirmation of design.</p>



<p>Identity is just going through that same transition.</p>



<h2 class="wp-block-heading">From Defining Intent to Validating Reality</h2>



<p>IGA is a <strong>control and workflow plane</strong>, focused on policies, roles, lifecycle workflows, certifications, and compliance artifacts. Identity observability, on the other hand, is an <strong>assurance and insight plane</strong>, focused on whether those controls actually work, where identity data drifts, how access is really being used, and when behavior diverges from intent.</p>



<p>Put simply, IGA defines what <em>should</em> be true, whereas identity observability validates what <em>is</em> true.</p>



<p>The key learning for me was that Identity Observability wasn’t just next gen IGA. It’s a layer that sits above heterogeneous IAM, IGA, PAM, and CIEM tools to make their behavior visible and explainable.</p>



<figure class="wp-block-image size-large"><a href="https://blog.talkingidentity.com/wp-content/uploads/2026/02/fit_together.jpg"><img decoding="async" width="1024" height="417" src="https://blog.talkingidentity.com/wp-content/uploads/2026/02/fit_together-1024x417.jpg" alt="Graphic of jigsaw pieces being fit together." class="wp-image-2502" srcset="https://blog.talkingidentity.com/wp-content/uploads/2026/02/fit_together-1024x417.jpg 1024w, https://blog.talkingidentity.com/wp-content/uploads/2026/02/fit_together-300x122.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2026/02/fit_together-768x313.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2026/02/fit_together-1536x626.jpg 1536w, https://blog.talkingidentity.com/wp-content/uploads/2026/02/fit_together.jpg 2000w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>And this is more important than ever. In modern enterprises, identity isn’t static, necessitating a shift from periodic governance to <strong>Continuous Identity</strong>: continuously validated, continuously explainable, continuously defensible. Modern identity environments have changed dramatically as well. They are multi-cloud, SaaS-heavy, API-driven, full of non-human identities (another term I have been trying to get used to), and owned by many teams. Just like applications and infrastructure before them, identity systems have become distributed systems. And distributed systems require observability.</p>



<p>This makes it almost impossible for organizations to rely solely on a single, centralized control plane to continuously answer the question:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“Is the entire identity fabric behaving as intended, end to end?”</p>
</blockquote>



<p>As identity sprawl increases, that question becomes unavoidable. Identity observability introduces a meta-layer that enables identity teams to take this challenge on by:</p>



<ul class="wp-block-list">
<li>correlating signals across identity systems</li>



<li>detecting gaps between design and reality</li>



<li>compressing time to insight (crucial to the “continuous” element)</li>



<li>making identity decisions defensible</li>
</ul>



<p>So, if you’ve ever been surprised by an audit finding, discovered access paths you didn’t model, found entitlements no one remembered granting, learned a control existed but wasn’t enforced, or spent weeks investigating a “simple” identity issue, then you already understand the problem identity observability is trying to solve. For years, we’ve focused on building IGA systems that can enforce rules. Now we’re realizing we also need systems that can <em>explain</em> behavior.</p>



<p>Because, as the headline said, <strong>you can’t secure what you can’t explain</strong>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Windows 11 Just Gave Passkeys a Boost</title>
		<link>https://blog.talkingidentity.com/2025/12/windows-11-just-gave-passkeys-a-boost.html</link>
		
		<dc:creator><![CDATA[Nishant Kaushik]]></dc:creator>
		<pubDate>Tue, 16 Dec 2025 14:03:18 +0000</pubDate>
				<category><![CDATA[Insight IdM]]></category>
		<category><![CDATA[Credential Managers]]></category>
		<category><![CDATA[Cross Device Authentication]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Passkeys]]></category>
		<category><![CDATA[Passwordless]]></category>
		<category><![CDATA[Passwords Must Die]]></category>
		<guid isPermaLink="false">https://blog.talkingidentity.com/?p=2490</guid>

					<description><![CDATA[You may have missed this recent announcement Microsoft made about adding native support for third-party passkey managers (commonly referred to as credential managers) in Windows 11. From the perspective of anyone committed to building stronger, more usable identity systems, this is an important development, and paired with the introduction of passkey syncing in their own [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>You may have missed <a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/windows-11-expands-passkey-manager-support/4467572" target="_blank" rel="noreferrer noopener">this recent announcement Microsoft made</a> about adding native support for third-party passkey managers (commonly referred to as credential managers) in Windows 11. From the perspective of anyone committed to building stronger, more usable identity systems, this is an important development, and paired with <a href="https://blogs.windows.com/msedgedev/2025/11/03/microsoft-edge-introduces-passkey-saving-and-syncing-with-microsoft-password-manager/" target="_blank" rel="noreferrer noopener">the introduction of passkey syncing in their own credential manager (Microsoft Password Manager)</a>, signals another meaningful step forward for secure, cross-platform authentication.</p>



<p>With this update, users on Windows 11 can now leverage third-party credential managers (not just Microsoft’s own). This is similar to how you can currently use third-party credential managers on your iPhone or Android phone. The third-party credential managers supported at launch are 1Password and Bitwarden, with the promise of more to come. </p>



<p>By integrating directly into Windows, passkey operations (creation, sign-in, management) in these credential managers can leverage Windows Hello, the same user verification and key protection framework leveraged by Microsoft’s own passkey authenticator. This means that any passkey stored with the credential manager of the user&#8217;s choice benefits from the same device-based security architecture of Windows Hello: a strong authentication model based on a local device PIN or biometric (face or fingerprint recognition) that is secured by the Trusted Platform Module (TPM). Significantly, all passkeys in the credential manager are accessible in both browsers and native desktop applications, not just web contexts, providing the consistent experience you might be used to on your iOS or Android device.</p>



<p>With this update, Windows 11 is treating passkeys as first-class credentials, managed by users’ preferred tools, but secured by device-level security controls everywhere they’re used.</p>



<h2 class="wp-block-heading">More Interoperability, Less Friction</h2>



<p>Providing individuals and enterprises <strong>choice</strong> and <strong>flexibility</strong> in credential managers — so users aren’t limited in how to manage their passkeys, or forced to set up and manage different passkeys for different platforms — is an important element in the plan to make passkeys ubiquitous. All of us working to make passwordless happen do understand that not everyone wants to (or can) use the platform credential manager. By enabling third-party credential managers, the platforms (like Microsoft here) empower users and organizations to adopt passkeys on their own terms, while preserving strong security through their built-in security frameworks (in the case of this Microsoft announcement, this refers to the Windows Hello framework).</p>



<p>Because passkeys now work in native apps too (not just web), and sync across devices, Windows users can enjoy consistent, fast, and secure sign-in everywhere. That reduces friction, improves user experience, and drives broader adoption. That’s a big deal for both consumer and enterprise deployments.</p>



<h2 class="wp-block-heading">The Hidden Win to Help End Password Pain</h2>



<p>What may not be obvious on the surface is how the flexibility this update introduces helps push us towards a truly passwordless future. Supporting third-party credential managers as first-class citizens is particularly important to the cross device and cross platform use of passkeys.</p>



<figure class="wp-block-image size-large"><a href="https://blog.talkingidentity.com/wp-content/uploads/2025/12/Microsoft11_Post-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="577" src="https://blog.talkingidentity.com/wp-content/uploads/2025/12/Microsoft11_Post-1024x577.jpg" alt="" class="wp-image-2492" srcset="https://blog.talkingidentity.com/wp-content/uploads/2025/12/Microsoft11_Post-1024x577.jpg 1024w, https://blog.talkingidentity.com/wp-content/uploads/2025/12/Microsoft11_Post-300x169.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2025/12/Microsoft11_Post-768x433.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2025/12/Microsoft11_Post-1536x866.jpg 1536w, https://blog.talkingidentity.com/wp-content/uploads/2025/12/Microsoft11_Post-2048x1154.jpg 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>One of the most common reasons people give for their hesitance in setting up a passkey when prompted (usually on their mobile phone) has been “how will I use this on my laptop?”. Of course, <a href="https://www.passkeycentral.org/design-guidelines/optional-patterns/cross-device-sign-in" target="_blank" rel="noreferrer noopener">FIDO Cross Device Authentication</a> can be used to securely address this scenario. But when synced passkeys were introduced, it gave a significant boost to passkey adoption because having the passkey just show up on your other devices ready to use, instead of having to go through the cross device sign-in flow, was a much smoother experience.</p>



<p>Of course, having a Windows desktop/laptop combined with an iOS/Android phone is the most common setup for many folks, both at home and in the workplace. That’s why this update in Windows 11 is so great, because it makes the power of synced passkeys available to a much bigger proportion of global sign-ins. People with this setup can now use the same credential manager on all their devices, regardless of platform, making their passkey usage seamless across all their everyday devices. Enterprises can deploy the managed credential manager of their choice for their workforce, with the promise of simpler management and smoother multi-platform experience made real. And everyone can still benefit from phishing-resistant cross device authentication for those once-in-a-while situations like logging in on a friend or family member’s device, on shared terminals, or at a public kiosk.</p>



<h2 class="wp-block-heading">Moving Toward a Passwordless World, Together</h2>



<p>With this architectural pattern of building passkey support deep into the OS and extending it to third-party credential managers taking hold in the different platforms, it reinforces FIDO’s role in the identity fabric of the web and enterprise alike. For identity architects and security teams, this update makes it more feasible and cost-effective to plan migrations away from passwords, and achieve a world of fewer support tickets, fewer phishing incidents, and stronger compliance posture. More importantly, this update brings together security, usability, flexibility, and open standards in a package that benefits users, organizations, developers, and the broader identity ecosystem.</p>



<p>All in all, I think it’s safe to say that Windows 11’s new pluggable credential manager support is another compelling signal that the ecosystem is ready and primed to unlock passkeys for real-world scale.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>For Digital Credentials, The FIDO Alliance Has Entered The Chat</title>
		<link>https://blog.talkingidentity.com/2025/12/for-digital-credentials-the-fido-alliance-has-entered-the-chat.html</link>
		
		<dc:creator><![CDATA[Nishant Kaushik]]></dc:creator>
		<pubDate>Fri, 05 Dec 2025 14:50:15 +0000</pubDate>
				<category><![CDATA[Insight IdM]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Digital Trust]]></category>
		<category><![CDATA[FIDO Alliance]]></category>
		<category><![CDATA[Identity Wallets]]></category>
		<category><![CDATA[Passkeys]]></category>
		<category><![CDATA[Verifiable Credentials]]></category>
		<category><![CDATA[Verifiable Digital Credentials]]></category>
		<guid isPermaLink="false">https://blog.talkingidentity.com/?p=2486</guid>

					<description><![CDATA[Getting rid of passwords has never been the end goal, not really. The mission has always been to make digital life simpler and safer for everyone, and to give organizations the ability to operate and deliver services securely, without unnecessary friction. Moving to phishing-resistant, passwordless authentication is a critical part of that, but it doesn’t [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Getting rid of passwords has never been the end goal, not really. The mission has always been to make digital life simpler and safer for everyone, and to give organizations the ability to operate and deliver services securely, without unnecessary friction. Moving to phishing-resistant, passwordless authentication is a critical part of that, but it doesn’t stand alone. It’s one link in a much larger identity operations chain that must work cohesively, seamlessly, and securely end-to-end to achieve the outcomes we all want.</p>



<p>That’s why I’m proud to share that the FIDO Alliance has <a href="https://fidoalliance.org/fido-alliance-launches-new-digital-credentials-initiative-to-accelerate-and-secure-an-interoperable-digital-identity-ecosystem/" target="_blank" rel="noreferrer noopener">launched a new Digital Credentials Initiative</a> — a major step toward a future where digital identity wallets and verifiable credentials are as seamless, trusted, and interoperable as passkeys are becoming. In collaboration with our members and partners, we’re building a trusted ecosystem of digital credentials that can be managed by secure wallets, verified across platforms, and used both online and in person for a wide range of real-world scenarios. All while keeping security, privacy, and usability at the center.</p>



<p>As digital ecosystems continue to converge — across payments, health, travel, identity, and enterprise access — having a <strong>standards-based, interoperable</strong> identity infrastructure is no longer optional. It’s foundational. The opportunity to help shape the digital identity infrastructure of the next decade is exactly what excited me about joining the FIDO Alliance, and launching the new <strong>Digital Credentials Working Group</strong> with our members is just the first of many steps we’ll take as we advance our expanded mission.</p>



<p>Explore what this means and how to get involved <a href="https://fidoalliance.org/fido-alliance-digital-credentials/" target="_blank" rel="noreferrer noopener">here</a>. Come join the fun.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why I joined the FIDO Alliance</title>
		<link>https://blog.talkingidentity.com/2025/10/why-i-joined-the-fido-alliance.html</link>
		
		<dc:creator><![CDATA[Nishant Kaushik]]></dc:creator>
		<pubDate>Tue, 28 Oct 2025 04:17:17 +0000</pubDate>
				<category><![CDATA[Musings]]></category>
		<category><![CDATA[Challenges]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[FIDO Alliance]]></category>
		<category><![CDATA[Identity for Humans]]></category>
		<category><![CDATA[IdM Standards]]></category>
		<category><![CDATA[Passkeys]]></category>
		<category><![CDATA[Strong Authentication]]></category>
		<guid isPermaLink="false">https://blog.talkingidentity.com/?p=2472</guid>

					<description><![CDATA[I’m back from an exhilarating, albeit tiring, week at the FIDO Alliance’s annual Authenticate conference. As you probably already know, I recently joined the Alliance as Chief Technology Officer, which made this experience a little bit different than years past. There is a lot going on in the digital identity ecosystem right now, which really [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>I’m back from an exhilarating, albeit tiring, week at the FIDO Alliance’s annual <a href="https://authenticatecon.com/" target="_blank" rel="noreferrer noopener">Authenticate conference</a>. As you probably already know, I recently joined the Alliance as Chief Technology Officer, which made this experience a little bit different than years past. There is a lot going on in the digital identity ecosystem right now, which really drives why I took on this new role, a question that many have asked me over the last couple of months.</p>



<figure class="wp-block-image size-large"><a href="https://blog.talkingidentity.com/wp-content/uploads/2025/10/FIDO_Alliance_iPad-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="458" src="https://blog.talkingidentity.com/wp-content/uploads/2025/10/FIDO_Alliance_iPad-1024x458.jpg" alt="" class="wp-image-2476" srcset="https://blog.talkingidentity.com/wp-content/uploads/2025/10/FIDO_Alliance_iPad-1024x458.jpg 1024w, https://blog.talkingidentity.com/wp-content/uploads/2025/10/FIDO_Alliance_iPad-300x134.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2025/10/FIDO_Alliance_iPad-768x343.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2025/10/FIDO_Alliance_iPad-1536x687.jpg 1536w, https://blog.talkingidentity.com/wp-content/uploads/2025/10/FIDO_Alliance_iPad-2048x915.jpg 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p></p>



<p>If you’ve followed my conference talks and blog posts, you know I care deeply about one simple idea: security should make people feel safer <em>and</em> let them get on with their lives. The FIDO Alliance has been driven by that mission for years, with passkeys being the result of that drive &#8211; phishing-resistant authentication that is user-friendly and now broadly available across platforms.</p>



<p>But the road from specifications to success has two lanes: <strong>adoption at scale</strong> and <strong>alignment with the rules of the road</strong>. Adoption means helping implementers make the right choices, smoothing out the rough edges of real deployments, and proving interoperability through strong certification programs. Alignment means working with policymakers and regulators so that what’s good security practice is also recognized in frameworks and guidance around the world. Both require patient, collaborative work. That’s a big part of why I’m here, and what I find exciting and motivating about taking on this new challenge.</p>



<p>My role at FIDO will be to help our membership guide the Alliance’s technical strategy, keep our specifications coherent and practical, and make sure they tie cleanly to certification and interoperability so relying parties can trust what they’re deploying. It also means rolling up sleeves with our members, other standards bodies, and the public sector to ensure FIDO technology fits naturally into the broader digital trust fabric.</p>



<p>That fabric itself is evolving quite rapidly. Authentication doesn’t live in a vacuum; it connects to how identities are verified, how credentials are carried, and how transactions move. As the ecosystem matures, we’ll continue doing what the FIDO Alliance has always done best: focus on pragmatic, widely adoptable building blocks that make it harder to phish people, harder to steal value, and easier for legitimate users to get things done. This will necessarily touch adjacent areas &#8211; identity verification, wallets, payments flows &#8211; where clear interfaces and strong assurances help reduce breach and fraud. The point isn’t to broaden the mission for its own sake, but to finish the mission we started: making the online world safer and simpler for everyone.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>So much universe, and so little time</title>
		<link>https://blog.talkingidentity.com/2025/09/so-much-universe-and-so-little-time.html</link>
		
		<dc:creator><![CDATA[Nishant Kaushik]]></dc:creator>
		<pubDate>Sat, 13 Sep 2025 14:49:39 +0000</pubDate>
				<category><![CDATA[Musings]]></category>
		<category><![CDATA[Andrew Nash]]></category>
		<category><![CDATA[Community]]></category>
		<category><![CDATA[Identirati]]></category>
		<category><![CDATA[Identity Family]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Remembrance]]></category>
		<guid isPermaLink="false">https://blog.talkingidentity.com/?p=2390</guid>

					<description><![CDATA[[Two of the best people in identity, and the world. And me] I’m on my way to SF to join many, many others in celebrating the life of handsome debonair man about town (self-attested) Andrew Nash. It’s taken me a few days to find the words to write this post. Not because I couldn’t talk [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-large"><a href="https://blog.talkingidentity.com/wp-content/uploads/2025/09/BannerWithPamAndAndrew-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="370" src="https://blog.talkingidentity.com/wp-content/uploads/2025/09/BannerWithPamAndAndrew-1024x370.jpg" alt="" class="wp-image-2425" srcset="https://blog.talkingidentity.com/wp-content/uploads/2025/09/BannerWithPamAndAndrew-1024x370.jpg 1024w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/BannerWithPamAndAndrew-300x108.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/BannerWithPamAndAndrew-768x277.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/BannerWithPamAndAndrew-1536x555.jpg 1536w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/BannerWithPamAndAndrew-2048x740.jpg 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>
</div>


<p class="has-text-align-center">[Two of the best people in identity, and the world. And me]</p>



<p>I’m on my way to SF to join many, many others in celebrating the life of <em>handsome debonair man about town</em> (self-attested) Andrew Nash. It’s taken me a few days to find the words to write this post. Not because I couldn’t talk about Andrew for hours and hours and hours (that&#8217;s called foreshadowing, kids). It’s because anything I can write feels inadequate. Inadequate to capture the generous soul that he was. Inadequate to capture the brilliance of his intellect. Inadequate to capture just how wonderful of a friend he was. But, most of all, completely inadequate to capture just how big of a loss it is that we will no longer have this legend amongst us, that I will no longer get to hear him say “I am just so badly misunderstood”, as he gives that big grin of his.</p>



<div class="wp-block-cover" style="min-height:100px;aspect-ratio:unset;"><img loading="lazy" decoding="async" width="300" height="156" class="wp-block-cover__image-background wp-image-2442 size-medium" alt="" src="https://blog.talkingidentity.com/wp-content/uploads/2025/09/8StmcCi8Ejaqem9xri25F9-300x156.jpg" data-object-fit="cover" srcset="https://blog.talkingidentity.com/wp-content/uploads/2025/09/8StmcCi8Ejaqem9xri25F9-300x156.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/8StmcCi8Ejaqem9xri25F9-768x400.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/8StmcCi8Ejaqem9xri25F9.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /><span aria-hidden="true" class="wp-block-cover__background has-background-dim" style="background-color:#161325"></span><div class="wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained">
<p class="has-text-align-center has-medium-font-size">I have no use for people who have learned the limits of the possible.</p>



<p class="has-text-align-center">― Terry Pratchett, The Last Hero</p>
</div></div>



<p>Hearing me describe him as a legend, his automatic retort would probably have been a good humored and self deprecating “And don’t you forget it”. If you’ve ever had the chance to watch him give a warm smile and laugh a “why, thank you” while glancing down at the ground when you gave him a compliment, you know just how down-to-earth this giant of our industry was. His contributions to security and identity are immense and have shaped our online world in so many ways. He always operated at the leading edge of things to come, whether it be PKI or API Gateways, Identity Verification or Payments, SAML and WS-* or Shared Signals. </p>



<figure class="wp-block-image size-large"><a href="https://blog.talkingidentity.com/wp-content/uploads/2025/09/Andrew_EIC.jpg"><img loading="lazy" decoding="async" width="1024" height="582" src="https://blog.talkingidentity.com/wp-content/uploads/2025/09/Andrew_EIC-1024x582.jpg" alt="" class="wp-image-2413" srcset="https://blog.talkingidentity.com/wp-content/uploads/2025/09/Andrew_EIC-1024x582.jpg 1024w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/Andrew_EIC-300x170.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/Andrew_EIC-768x436.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/Andrew_EIC-1536x873.jpg 1536w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/Andrew_EIC.jpg 1936w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p class="has-text-align-center">[Andrew was frequently my white rabbit]</p>



<p>Frankly (and I told him this many times), it was slightly annoying when you’d tell him about some really cool tech you came across or a fascinating idea you had, and he’d pull out the old “well, it was probably a few years ago that ….” or (even worse) “so we looked at that a while ago, and here’s all the issues you’re about to run into”. His knowledge was vast, and he had this innate ability to cut through the fluff and analyze a problem, an idea, or a technology quickly and comprehensively. He was the best sounding board you could ever find, and it almost felt like he knew exactly what to say to set you on the best possible path forward.</p>



<div class="wp-block-cover" style="min-height:100px;aspect-ratio:unset;"><img loading="lazy" decoding="async" width="300" height="156" class="wp-block-cover__image-background wp-image-2442 size-medium" alt="" src="https://blog.talkingidentity.com/wp-content/uploads/2025/09/8StmcCi8Ejaqem9xri25F9-300x156.jpg" data-object-fit="cover" srcset="https://blog.talkingidentity.com/wp-content/uploads/2025/09/8StmcCi8Ejaqem9xri25F9-300x156.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/8StmcCi8Ejaqem9xri25F9-768x400.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/8StmcCi8Ejaqem9xri25F9.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /><span aria-hidden="true" class="wp-block-cover__background has-background-dim" style="background-color:#161325"></span><div class="wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained">
<p class="has-text-align-center has-medium-font-size">Goodness is about what you do. Not who you pray to.</p>



<p class="has-text-align-center">― Terry Pratchett, Snuff</p>
</div></div>



<p>In many ways, that’s where his biggest and most invisible contribution to our tech industry is. So many of us are doing what we do because of how he helped shape our thinking and our careers in ways both big and small. If you ever needed counsel of any kind, he was there for you, happy to share his wisdom from decades as an entrepreneur, technologist, executive, thinker, tinkerer. He and Pam were the uber-connectors of the identity world, and so many business and work relationships were born at their annual Bootstrap gathering, when they would so generously open their home and go out out of their way to bring people in, making them feel at ease in a room full of strangers. It didn’t matter if you were new to identity, or had been doing this thing for decades. In that loud, boisterous, and seemingly never-to-be-finished house, you knew you were a part of something bigger, and that you belonged.</p>



<div class="wp-block-cover" style="min-height:100px;aspect-ratio:unset;"><img loading="lazy" decoding="async" width="300" height="156" class="wp-block-cover__image-background wp-image-2442 size-medium" alt="" src="https://blog.talkingidentity.com/wp-content/uploads/2025/09/8StmcCi8Ejaqem9xri25F9-300x156.jpg" data-object-fit="cover" srcset="https://blog.talkingidentity.com/wp-content/uploads/2025/09/8StmcCi8Ejaqem9xri25F9-300x156.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/8StmcCi8Ejaqem9xri25F9-768x400.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/8StmcCi8Ejaqem9xri25F9.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /><span aria-hidden="true" class="wp-block-cover__background has-background-dim" style="background-color:#161325"></span><div class="wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained">
<p class="has-text-align-center has-medium-font-size">It’s not worth doing something unless someone, somewhere, would much rather you weren’t doing it.</p>



<p class="has-text-align-center">― Terry Pratchett, in the foreword to The Ultimate Encyclopedia of Fantasy, by David Pringle</p>
</div></div>



<p>We had been friends for a few years when he asked me if I wanted to join him on the RSA Conference program committee, curating the identity track. I don’t know why he decided to ask me, but he will never know the kind of confidence boost it was to have him place that faith in me. He’d been doing it for so many years that he could probably do it in his sleep. But to him, it was a solemn responsibility &#8211; to the conference attendees, the speakers, and the industry; one that demanded that we make our very best effort at creating a track that was impactful and valuable, that we were proud of. The hours we’d spend arguing over some of the submissions were some of the most fun and intellectually stimulating debates I’ve been part of. Getting to work with such a brilliant man was incredibly rewarding. Getting to work with my friend was an absolute joy.</p>



<div class="wp-block-cover" style="min-height:100px;aspect-ratio:unset;"><img loading="lazy" decoding="async" width="300" height="156" class="wp-block-cover__image-background wp-image-2442 size-medium" alt="" src="https://blog.talkingidentity.com/wp-content/uploads/2025/09/8StmcCi8Ejaqem9xri25F9-300x156.jpg" data-object-fit="cover" srcset="https://blog.talkingidentity.com/wp-content/uploads/2025/09/8StmcCi8Ejaqem9xri25F9-300x156.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/8StmcCi8Ejaqem9xri25F9-768x400.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/8StmcCi8Ejaqem9xri25F9.jpg 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" /><span aria-hidden="true" class="wp-block-cover__background has-background-dim" style="background-color:#161325"></span><div class="wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained">
<p class="has-text-align-center has-medium-font-size">It’s still magic even if you know how it’s done.</p>



<p class="has-text-align-center">― Terry Pratchett, A Hat Full of Sky</p>
</div></div>



<p>You’d think that for someone who had accomplished so much, and was involved in so many things, he’d have no time for anything else. Yet somehow, in between pulling PayPal and Google full-fledged into the identity space, laying the foundation for Shared Signals and running a startup at Confyrm, and managing to incubate an identity business within CapitalOne, Andrew found time with Pam to painstakingly and lovingly renovate their SF Victorian themselves, set up an incredible basement workshop that was the envy of those he’d give endless tours to, trained to do precision machining….and so much more. Like so many of the best minds, he had an insatiable curiosity about everything, the drive to dig into anything, and the patience to take everyone along with him on his adventures.</p>



<figure class="wp-block-image size-large"><a href="https://blog.talkingidentity.com/wp-content/uploads/2025/09/Bootstrap_Floor-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="683" src="https://blog.talkingidentity.com/wp-content/uploads/2025/09/Bootstrap_Floor-1024x683.jpg" alt="" class="wp-image-2410" srcset="https://blog.talkingidentity.com/wp-content/uploads/2025/09/Bootstrap_Floor-1024x683.jpg 1024w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/Bootstrap_Floor-300x200.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/Bootstrap_Floor-768x512.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/Bootstrap_Floor-1536x1024.jpg 1536w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/Bootstrap_Floor-2048x1366.jpg 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p class="has-text-align-center">[Part of what lurks beneath the floors that Andrew and Pam laid down]</p>



<p>You may have heard of his passion project to create a replica of the Enigma machine. But nothing about Andrew was an enigma. He was incredibly kind. He was funny and witty. He was an intellectual giant, the closest thing I have ever encountered to a Renaissance Man. He was my friend. He was family. He was taken from us way too soon.</p>



<figure class="wp-block-image size-large"><a href="https://blog.talkingidentity.com/wp-content/uploads/2025/09/Andrew_Wisdom-1-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="567" src="https://blog.talkingidentity.com/wp-content/uploads/2025/09/Andrew_Wisdom-1-1024x567.jpg" alt="" class="wp-image-2449" srcset="https://blog.talkingidentity.com/wp-content/uploads/2025/09/Andrew_Wisdom-1-1024x567.jpg 1024w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/Andrew_Wisdom-1-300x166.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/Andrew_Wisdom-1-768x425.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/Andrew_Wisdom-1-1536x850.jpg 1536w, https://blog.talkingidentity.com/wp-content/uploads/2025/09/Andrew_Wisdom-1-2048x1134.jpg 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p class="has-text-align-center">[The last time I saw him, at this years Bootstrap. F Cancer!]</p>



<p>It is said that the hardest part of losing someone isn’t having to say goodbye but rather learning to live without them. Well, once again, Andrew was the teacher extraordinaire, because he taught us all how to live &#8211; fully, ridiculously happy, and dedicated to making an impact on the lives of others. I will try my best to follow your example, my friend.</p>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Secure-by-Design has an Incentive Problem</title>
		<link>https://blog.talkingidentity.com/2025/06/secure-by-design-has-an-incentive-problem.html</link>
		
		<dc:creator><![CDATA[Nishant Kaushik]]></dc:creator>
		<pubDate>Wed, 11 Jun 2025 18:18:11 +0000</pubDate>
				<category><![CDATA[Insight IdM]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Incentives]]></category>
		<category><![CDATA[Secure by Design]]></category>
		<category><![CDATA[Security Architecture]]></category>
		<guid isPermaLink="false">https://blog.talkingidentity.com/?p=2374</guid>

					<description><![CDATA[In my last blog post, I argued that we don’t need more innovation invention to fix the broken state of SaaS and cloud security that Patrick Opet&#8217;s open letter was calling out. Instead, I said that what we need are different priorities. The conversations it triggered basically boiled down to this: if we already know [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>In <a href="https://blog.talkingidentity.com/2025/05/the-innovation-we-need-is-strategic-not-technical.html">my last blog post</a>, I argued that we don’t need more <s>innovation</s> invention to fix the broken state of SaaS and cloud security that Patrick Opet&#8217;s open letter was calling out. Instead, I said that what we need are different priorities. The conversations it triggered basically boiled down to this: if we already know what good looks like, why aren’t more vendors and enterprises doing it?</p>



<p><em>&lt;Slight aside&gt;On LinkedIn, Mike Schwartz <a href="https://www.linkedin.com/feed/update/urn:li:activity:7328465577360900098?commentUrn=urn%3Ali%3Acomment%3A%28activity%3A7328465577360900098%2C7333473497727307776%29&amp;dashCommentUrn=urn%3Ali%3Afsd_comment%3A%287333473497727307776%2Curn%3Ali%3Aactivity%3A7328465577360900098%29" target="_blank" rel="noreferrer noopener">called me out</a> for saying we don&#8217;t need innovation, which is fair. He pointed out that what I was calling out was not needing more invention (of new tech or standards), but innovating on just getting people to use a lot of what we already have. Thankfully, that lines up with where the rest of this post is going&lt;End aside&gt;</em></p>



<p>The answer, unfortunately, is as straightforward as it is challenging: <strong>the incentives are all wrong</strong>.</p>



<figure class="wp-block-image size-large"><a href="https://blog.talkingidentity.com/wp-content/uploads/2025/06/green-prophet-OAJj6_PjvBA-unsplash-scaled-e1749665329428.jpg"><img loading="lazy" decoding="async" width="1024" height="471" src="https://blog.talkingidentity.com/wp-content/uploads/2025/06/green-prophet-OAJj6_PjvBA-unsplash-scaled-e1749665329428-1024x471.jpg" alt="Photograph of a sign posted on a screen door, saying &quot;Be Aware of the Word's + Action's you chose here. All is being recorded for reviewing&quot;" class="wp-image-2378" srcset="https://blog.talkingidentity.com/wp-content/uploads/2025/06/green-prophet-OAJj6_PjvBA-unsplash-scaled-e1749665329428-1024x471.jpg 1024w, https://blog.talkingidentity.com/wp-content/uploads/2025/06/green-prophet-OAJj6_PjvBA-unsplash-scaled-e1749665329428-300x138.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2025/06/green-prophet-OAJj6_PjvBA-unsplash-scaled-e1749665329428-768x353.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2025/06/green-prophet-OAJj6_PjvBA-unsplash-scaled-e1749665329428-1536x707.jpg 1536w, https://blog.talkingidentity.com/wp-content/uploads/2025/06/green-prophet-OAJj6_PjvBA-unsplash-scaled-e1749665329428-2048x942.jpg 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p></p>



<p>Secure-by-design isn’t failing because the right standards, technology, or architectures don’t exist. It’s failing because there is no systemic reason to prioritize it &#8211; neither for the people building software, nor for those buying it. In fact, one could argue that today’s ecosystem actually discourages secure-by-design thinking. Vendors end up optimizing for roadmap velocity, not resilience. Enterprise buyers meanwhile are optimizing for feature parity and price, not control integrity. Security teams are told to meet deadlines instead of challenging system design. And compliance overrides capability as the default benchmark for “good enough.”</p>



<h2 class="wp-block-heading">Compliance Is Treated as the Ceiling instead of the Floor</h2>



<p>As many discussions at the recently concluded <a href="https://www.identiverse.com" target="_blank" rel="noreferrer noopener">Identiverse</a> conference made clear, compliance does result in security, but the kind that’s seemingly frozen in time: narrowly scoped, backward-looking, and audit-centric. Compliance-driven security doesn’t adapt as threats evolve. It doesn’t incentivize secure architectures. And it certainly doesn’t reward proactive, defense-in-depth investments like the ones being called for: session integrity, token binding, or real-time access evaluation.</p>



<p>This is what makes Patrick Opet’s open letter so relevant. Despite my reservations with where some of the blame was laid, what it clearly did was call out the need for all of us to stop settling for security theater, and to start building systems that are actually resilient to our ever-evolving threat landscape.</p>



<p>The hard truth is that we can&#8217;t expect (security) people to just do the right thing (cue <a href="https://www.linkedin.com/in/sanderiam/" target="_blank" rel="noreferrer noopener">the philosopher</a> in my ear saying &#8220;duh!&#8221;). We need to create incentives for doing the right thing.</p>



<p>Secure-by-design isn&#8217;t rocket science, but it does require effort. It requires time, architectural rethink, cross-functional coordination, and long-term investment. Unfortunately in today’s landscape, it is hard to find places where that is rewarded (though I have seen some examples of teams really trying).</p>



<p>So if we want more secure-by-design adoption, we need to fix the incentive structures that govern behavior, both for vendors as well as buyers.</p>



<h2 class="wp-block-heading">What A Good Incentive Structure <em>Could</em> Look Like</h2>



<ol class="wp-block-list">
<li><strong>Shift Liability for Insecure Defaults</strong>: Right now, when SaaS vendors ship insecure implementations of OAuth or rely on fragile session management, it is the customer who typically pays the price in the event of a breach. Introducing clearer, shared liability standards &#8211; especially in cases of negligence or insecure-by-default configurations &#8211; would force vendors to take greater ownership of security posture, not just feature completeness. And I say this as someone who&#8217;s spent his life mostly on the vendor side of the equation.</li>



<li><strong>Make Secure Architectures a Market Advantage</strong>: Security is often invisible in the buying process. That has to change. Procurement teams can start by asking tougher/deeper questions in RFPs. Go beyond “Do you support SSO?” and &#8220;Do you implement OAuth&#8221;, and start asking “How do you manage token lifecycle and session state?” and “are you enforcing DPoP or Mutual TLS?”. Independent benchmarking (think energy efficiency ratings or credit scores) could create a public, competitive metric for software security maturity. As a security industry, we need to make it much, much easier for buyers to do comparative evaluations.</li>



<li><strong>Reward Security Investments with Lower Cyber Risk Premiums</strong>: Cyber insurance is a rapidly growing space. Providers are already building models to assess risk posture, and are in a perfect position to reward vendors and buyers who implement secure-by-design principles with lower premiums or higher coverage ceilings. This is already done in other domains (drivers that have done a defensive driving course are cheaper to insure). So why can&#8217;t we do the same for software with hardened session controls? Of course, the previous point about creating benchmarks and making comparisons easier become relevant here.</li>



<li><strong>Measure the Right Things at the Board Level</strong>: How many posts have we seen about security and fraud reduction needing to become a board level priority. But it has to be done correctly. If the only metric security leaders are reporting to the board is “number of passed audits,” then secure-by-design will never get the visibility or funding it needs. We need to elevate identity posture, architectural maturity, and integration integrity to the same level as SLAs and NPS. Security isn’t just a function of the CISO. It’s a strategic business risk. And boards should treat it accordingly, giving CISOs the support they need.</li>



<li><strong>Embed Security Into Corporate Culture</strong>: This one’s less about structure and more about mindset. Just as accessibility and sustainability are becoming table stakes in modern product development (sometimes through regulation), secure-by-design needs the same kind of internal advocacy. That means giving product managers and engineers the time, training, and tooling to make security a design decision, and not something relegated to a post-launch cleanup effort. It means moving security left and up the value chain.</li>
</ol>



<h2 class="wp-block-heading">This Isn’t About Blame. It’s About Incentive Design.</h2>



<p>The clear need of the hour is to realign the system so that secure-by-design becomes the default outcome of doing good business. That means rethinking procurement, regulation, insurance, and organizational measurement. This is asking more of both enterprise buyers and vendors, but also giving them a reason to invest.</p>



<p>The technical playbook already exists. The missing ingredient is the will to change incentives. Until we fix that, we’ll keep pretending that compliance is enough, even as the cracks widen. We must stop rewarding checkbox security. Let&#8217;s start building systems that are actually built to withstand the world we live in.</p>



<figure class="wp-block-image size-large"><a href="https://blog.talkingidentity.com/wp-content/uploads/2025/06/getty-images-7dN3b9Xh84Q-unsplash-scaled-e1749665612943.jpg"><img loading="lazy" decoding="async" width="1024" height="450" src="https://blog.talkingidentity.com/wp-content/uploads/2025/06/getty-images-7dN3b9Xh84Q-unsplash-scaled-e1749665612943-1024x450.jpg" alt="Photograph of two executives looking at a laptop and cheering." class="wp-image-2379" srcset="https://blog.talkingidentity.com/wp-content/uploads/2025/06/getty-images-7dN3b9Xh84Q-unsplash-scaled-e1749665612943-1024x450.jpg 1024w, https://blog.talkingidentity.com/wp-content/uploads/2025/06/getty-images-7dN3b9Xh84Q-unsplash-scaled-e1749665612943-300x132.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2025/06/getty-images-7dN3b9Xh84Q-unsplash-scaled-e1749665612943-768x338.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2025/06/getty-images-7dN3b9Xh84Q-unsplash-scaled-e1749665612943-1536x676.jpg 1536w, https://blog.talkingidentity.com/wp-content/uploads/2025/06/getty-images-7dN3b9Xh84Q-unsplash-scaled-e1749665612943-2048x901.jpg 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Innovation We Need is Strategic, Not Technical</title>
		<link>https://blog.talkingidentity.com/2025/05/the-innovation-we-need-is-strategic-not-technical.html</link>
		
		<dc:creator><![CDATA[Nishant Kaushik]]></dc:creator>
		<pubDate>Wed, 14 May 2025 03:58:05 +0000</pubDate>
				<category><![CDATA[Insight IdM]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[IdM Standards]]></category>
		<category><![CDATA[RSA Conference]]></category>
		<category><![CDATA[Secure by Design]]></category>
		<category><![CDATA[Security Architecture]]></category>
		<guid isPermaLink="false">https://blog.talkingidentity.com/?p=2352</guid>

					<description><![CDATA[In my recap of RSAC 2025, I referenced the open letter that Patrick Opet, CISO of JPMorgan Chase, published in which he spoke about how essential security guardrails are being broken down by the lack of secure-by-design thinking in modern integration patterns within the SaaS world. His open letter challenged Cloud and SaaS providers to [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>In my <a href="https://blog.talkingidentity.com/2025/05/rsac-2025-ai-is-everywhere-trust-not-so-much.html">recap of RSAC 2025</a>, I referenced the <a href="https://www.jpmorgan.com/technology/technology-blog/open-letter-to-our-suppliers" target="_blank" rel="noreferrer noopener">open letter that Patrick Opet</a>, CISO of JPMorgan Chase, published in which he spoke about how essential security guardrails are being broken down by the lack of secure-by-design thinking in modern integration patterns within the SaaS world. His open letter challenged Cloud and SaaS providers to step up their security posture, and he called out the way in which modern identity protocols like OAuth are being used as contributing to the problem. The summary: industry is sacrificing foundational controls in exchange for business velocity, and creating a growing surface of identity and token-based vulnerabilities in the process.</p>



<p>Here&#8217;s an uncomfortable truth. Most of the risks being called out already have solutions &#8211; at least technically. The standards, protocols, and architectural patterns required to address them already exist. What’s lacking is the organizational will to implement them, the investment required to modernize infrastructure for security, and the discipline to prioritize long-term resilience over short-term delivery.</p>



<figure class="wp-block-image size-large"><a href="https://blog.talkingidentity.com/wp-content/uploads/2025/05/parkour_crumblingfoundations-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="390" src="https://blog.talkingidentity.com/wp-content/uploads/2025/05/parkour_crumblingfoundations-1024x390.jpg" alt="Photograph of a person leaping over the crumbling buildings of ruins" class="wp-image-2356" srcset="https://blog.talkingidentity.com/wp-content/uploads/2025/05/parkour_crumblingfoundations-1024x390.jpg 1024w, https://blog.talkingidentity.com/wp-content/uploads/2025/05/parkour_crumblingfoundations-300x114.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2025/05/parkour_crumblingfoundations-768x292.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2025/05/parkour_crumblingfoundations-1536x584.jpg 1536w, https://blog.talkingidentity.com/wp-content/uploads/2025/05/parkour_crumblingfoundations-2048x779.jpg 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p></p>



<p>And this isn’t just a failure of vendors. It’s also a consequence of enterprise buyers rewarding compliance over capability, and executives framing security as a function of audit readiness rather than operational integrity.</p>



<h2 class="wp-block-heading">Standards ≠ Security</h2>



<p>Any conversation about this situation must necessarily discuss this fundamental disconnect. More than once, I&#8217;ve heard a senior IT leader assure me their APIs are “secure” because they’ve implemented OAuth. However, while standards do provide a foundation for security, they are not guarantees for security in of themselves. <strong>Implementation matters</strong>. <strong>Configuration matters</strong>. <strong>Layering matters</strong>. After all, deploying OpenID Connect for authentication means little if the authentication method is still password-based and single-factor.</p>



<p>Let&#8217;s look at Opet’s concern about session token theft, an increasingly common attack vector. This risk wasn&#8217;t unforeseen by those working on modern identity standards. It is among the many reasons why the <a href="https://curity.io/resources/learn/what-is-financial-grade/" target="_blank" rel="noreferrer noopener">Financial-grade API (FAPI) security profile</a> was created by the OpenID Foundation. Originally designed for the financial sector, FAPI improves security for the OAuth and OpenID Connect standards by explicitly defining a security profile designed to ensure consistent and robust security measures across implementations of the standards with no room for misinterpretation. FAPI adds stricter constraints and requirements, like mandatory Strong Customer Authentication (SCA) and Mutual TLS, while also specifying additional controls like Demonstration of Proof-of-Possession (DPoP) and Proof Key for Code Exchange (PKCE). These aren’t experimental ideas. They’re proven, deployable measures that can be adopted by any organization (not just FIs), designed to eliminate many common attack vectors, including the ones highlighted in Opet&#8217;s letter.</p>



<p>Complementing this, the <a href="https://sharedsignals.guide/" target="_blank" rel="noreferrer noopener">Shared Signals Framework (SSF)</a> and <a href="https://sgnl.ai/2025/03/caep-cloud-security/" target="_blank" rel="noreferrer noopener">Continuous Access Evaluation Profile (CAEP)</a> provide a mechanism to continuously align session state with real-time risk posture. CAEP enables cloud providers and enterprises to stay ahead of evolving threats by providing an event-based mechanism to add much needed context into the continuous adaptation and enforcement of access policies beyond the initial session established.</p>



<p>But here’s the problem: few organizations implement these controls at scale (unless forced by regulations like Open Banking). Why? Because they require real effort: redesigning app architectures, updating legacy integrations, and investing in a deeper understanding of token and access lifecycle management. And don&#8217;t get me started on SaaS providers that charge extra for foundational security capabilities (a practice we lovingly refer to as the &#8220;SSO Tax&#8221;), essentially compounding the problem since cybersecurity is already viewed as a cost-center.</p>



<p>The technology is here. The risk is clear. The inertia is organizational.</p>



<h2 class="wp-block-heading">Compliance ≠ Security</h2>



<p>It&#8217;s become cliche, but the fact remains that too many organizations still optimize for compliance, not security. Security leaders are pushed to check boxes and meet deadlines, not to redesign systems around identity assurance. Dev teams are incentivized to ship features fast, not to integrate securely. Auditors audit for usage of standards and control frameworks, not for the strength and resilience of those controls. Executive teams often lack visibility into how quickly small risks compound into systemic exposures. All while CISOs lack budget to implement the programs that could help mitigate the unfolding nightmare.</p>



<figure class="wp-block-image size-large"><a href="https://blog.talkingidentity.com/wp-content/uploads/2025/05/audit_files-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="399" src="https://blog.talkingidentity.com/wp-content/uploads/2025/05/audit_files-1024x399.jpg" alt="Picture of piled up documents with post-it notes sticking out." class="wp-image-2357" srcset="https://blog.talkingidentity.com/wp-content/uploads/2025/05/audit_files-1024x399.jpg 1024w, https://blog.talkingidentity.com/wp-content/uploads/2025/05/audit_files-300x117.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2025/05/audit_files-768x300.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2025/05/audit_files-1536x599.jpg 1536w, https://blog.talkingidentity.com/wp-content/uploads/2025/05/audit_files-2048x799.jpg 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p></p>



<p>Don&#8217;t get me wrong. Compliance provides a crucial baseline of security controls that can be assessed and measured for existence. However, it doesn&#8217;t define how contextually strong or sufficient they are to meet an organizations security needs (if the organization can even define that). Put differently: compliance is a critical driver for putting better security in place, but it should be understood to be the starting point, not the end state.</p>



<p> Vulnerabilities like session hijacking and over-scoped permissions are therefore the entirely predictable outcomes of the fragile and hard-to-monitor architectures of systems that have been designed around minimum viable control.</p>



<h2 class="wp-block-heading">We Don’t Need New Innovation. We Need New Priorities.</h2>



<p>Cybersecurity threats are evolving at a rapid pace, and emerging technologies like AI are adding fuel to the fire. Compliance mandates will not be able to keep up (if they ever were), leaving organizations open to emerging threats unless they are proactive and innovative. To that end, many of the the tools are already there. Deterministic controls like phishing-resistant authentication, verifiable credentials, and more can help organizations dramatically reduce their attack surface. Comprehensive identity security posture management can help organizations gain visibility and remediate weaknesses in their identity infrastructure, automate controls, and proactively reduce potential risks to their digital ecosystem. FAPI, SSF, and CAEP are amongst a set of standards-based, security-focused architectural patterns that can be implemented today. And as overused as the term may be, the principles of Zero Trust are key: trust no session, verify continuously, and assume compromise as a starting condition.</p>



<p>The response to Patrick Opet’s letter shouldn’t be a scramble to invent something new. It should be a serious look at why we aren’t doing what we already know works. It&#8217;s time we recognize that the gap isn’t technical; it’s cultural and strategic. The change we need is a function of <s>priorities</s> incentives. As long as security is viewed as a cost center, where the cost of not being secure-by-design can be passed onto individuals and society, the fundamental calculus and therefore the current state of affairs won&#8217;t change. But that&#8217;s a discussion for a follow-up post.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>RSAC 2025: AI is Everywhere. Trust? Not So Much.</title>
		<link>https://blog.talkingidentity.com/2025/05/rsac-2025-ai-is-everywhere-trust-not-so-much.html</link>
		
		<dc:creator><![CDATA[Nishant Kaushik]]></dc:creator>
		<pubDate>Mon, 05 May 2025 15:42:18 +0000</pubDate>
				<category><![CDATA[Insight IdM]]></category>
		<category><![CDATA[Agentic AI]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Digital Trust]]></category>
		<category><![CDATA[RSA Conference]]></category>
		<category><![CDATA[RSAC]]></category>
		<category><![CDATA[RSAC2025]]></category>
		<category><![CDATA[Secure by Design]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Trust]]></category>
		<guid isPermaLink="false">https://blog.talkingidentity.com/?p=2347</guid>

					<description><![CDATA[Just wrapped up a packed, somewhat frenetic, but mostly enjoyable RSAC 2025 Conference. And if I had to sum it up in a sentence: AI is everywhere, but trust and control are still catching up. The conference opened with a shot fired across the bow of the security and identity industry. Patrick Opet, CISO of [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Just wrapped up a packed, somewhat frenetic, but mostly enjoyable <strong>RSAC 2025 Conference</strong>. And if I had to sum it up in a sentence: AI is everywhere, but trust and control are still catching up.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><a href="https://blog.talkingidentity.com/wp-content/uploads/2025/05/IMG_3063-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="575" src="https://blog.talkingidentity.com/wp-content/uploads/2025/05/IMG_3063-1024x575.jpg" alt="Photo of the sculpture of &quot;#RSAC&quot; at the 2025 RSAC Conference" class="wp-image-2348" srcset="https://blog.talkingidentity.com/wp-content/uploads/2025/05/IMG_3063-1024x575.jpg 1024w, https://blog.talkingidentity.com/wp-content/uploads/2025/05/IMG_3063-300x168.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2025/05/IMG_3063-768x431.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2025/05/IMG_3063-1536x863.jpg 1536w, https://blog.talkingidentity.com/wp-content/uploads/2025/05/IMG_3063-2048x1150.jpg 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>
</div>


<p>The conference opened with a shot fired across the bow of the security and identity industry. Patrick Opet, CISO of JPMorganChase, published <a href="https://www.jpmorgan.com/technology/technology-blog/open-letter-to-our-suppliers" target="_blank" rel="noreferrer noopener">an open letter</a> challenging the lack of secure-by-design thinking in modern integration patterns within the SaaS world, which is breaking down essential security guardrails. He specifically called out how the success of modern identity protocols (like OAuth) in enabling these integrations is actually leading to complacency in the pursuit of speed and convenience, and that improper setup of permission scopes and controls is creating vulnerabilities across a far broader and distributed attack surface.</p>



<p>In a way, his call-to-action both complements and contradicts what I saw at RSAC 2025. AI is speeding its way into the IT and SOC infrastructure for every organization &#8211; not as a theoretical capability, but as a triage partner, copilot, and even autonomous investigator (with decision maker just around the corner). When it comes to the SOC, however, it’s becoming clear that flashy dashboards aren’t enough any more. CISOs and practitioners are looking for proof that these tools drive outcomes at scale and don&#8217;t just shift complexity elsewhere. You can’t just sprinkle some AI on your existing offerings and call it innovation.</p>



<p>Beyond tooling, a deeper theme emerged: AI is the new operational surface <em>and</em> the new attack surface. From agent memory manipulation to prompt injection, organizations are discovering vulnerabilities that didn’t exist a year ago. And with AI wrappers, SaaS sprawl, and loosely governed agent identities, enterprise risk is evolving faster than our control models.</p>



<p>Here’s what stuck with me most:</p>



<ul class="wp-block-list">
<li><strong>Identity is fragmenting fast</strong>: Humans, bots, APIs, and AI agents now live in parallel &#8211; each with its own lifecycle, permissions, and risks. Traditional IAM isn’t cutting it. Identity Security was one of the main themes, but few people outside of the identity bubble can properly define it. NHIs are taking over the world (hopefully not in the literal sense). Folks by and large understand that identity is key, and are paying increased attention, especially to delegated authorization, agent-specific policy enforcement, and fine-grained data access controls.</li>



<li><strong>We’re not there yet on passkeys</strong>: While the news on passkey adoption and rollout continues to be encouraging, discussions at the conference show that it isn’t quite breaking through yet. Usability is still a major concern, manageability is viewed as a challenge, and people not immersed in identity still have fundamental questions. World Pass<s>word</s>key Day happened to fall during the conference, but it is clear that there is still a lot of (hard) work to do to overcome the hesitation many stakeholders still have.</li>



<li><strong>Memory is now a risk vector</strong>: Persistent agents that “learn” from interactions can also be misled by them. Attackers will go after context the way they once went after credentials. We need to secure not just the data agents access, but the logic and memory they build from it.</li>



<li>Identity and security must enable, not obstruct: Too many orgs still see security as something to bolt on &#8211; or worse, slow things down. But the smart ones are building it into the architecture from day one, recognizing that sacrificing a little bit of speed for control and resilience is more efficient in the long run. Identity Security has a critical role to play in this area, in making security and enablement scale together.</li>



<li><strong>The cost curve needs a reality check</strong>: Using LLMs and AI isn’t cheap. A thousand alerts a day could cost millions in processing alone. AI-powered doesn’t always mean ROI-powered, and I was surprised that few of the customers (prospective or existing) of security tools were asking how their costs or subscription would increase due to the addition of AI powered features. We need to get sharper about value, not just capability.</li>



<li><strong>CISOs are tired. And worried</strong>: Patrick Opet isn’t alone. Everyone’s chasing context and control. While many tools are claiming to combat alert fatigue, that is viewed largely as a temporary fix. Beyond visibility, they want clarity, resilience, and the ability to scale good decisions fast. Their overarching need is to shift the focus from <em>detect-and-respond</em> to <em>prevent-and-prove</em>.</li>
</ul>



<p>RSAC confirmed what many of us already felt: despite how we may feel about its current state, we have to accept that AI is becoming a business mandate. But without smart controls, agent-level governance, and identity models that match this new reality, we’re flying blind. We’re not just securing users anymore &#8211; we’re securing decision-making. It’s time to stop asking whether AI can do it, and start asking whether we’re building the trust infrastructure to let it.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Signing Off from Uniken: Thank You for the Adventure</title>
		<link>https://blog.talkingidentity.com/2025/02/signing-off-from-uniken-thank-you-for-the-adventure.html</link>
		
		<dc:creator><![CDATA[Nishant Kaushik]]></dc:creator>
		<pubDate>Wed, 19 Feb 2025 15:11:43 +0000</pubDate>
				<category><![CDATA[Insight IdM]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Uniken]]></category>
		<guid isPermaLink="false">https://blog.talkingidentity.com/?p=2330</guid>

					<description><![CDATA[It’s the end of an era: after eight incredible years, it felt like the right time to close the chapter on my story at Uniken. When I joined as CTO, Uniken was an ambitious startup with a unique core technology and a vision to make a global impact. What made the ensuing journey so rewarding [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>It’s the end of an era: after eight incredible years, it felt like the right time to close the chapter on my story at <a href="http://www.uniken.com" target="_blank" rel="noreferrer noopener">Uniken</a>. When <a href="https://www.streetinsider.com/Press+Releases/Uniken+Announces+Nishant+Kaushik+as+Chief+Technology+Officer/12739642.html" target="_blank" rel="noreferrer noopener">I joined as CTO</a>, Uniken was an ambitious startup with a unique core technology and a vision to make a global impact. What made the ensuing journey so rewarding was the team &#8211; exceptionally talented, deeply committed, and relentlessly innovative. Together, we navigated complex challenges, scaled through uncertainty (including a global pandemic), and built Uniken into a global cybersecurity leader with customer engagements on every continent (except Antarctica, because sadly it would appear that penguins aren’t really concerned about digital trust). </p>



<p>I am incredibly proud of the team, and the platform we built &#8211; one that empowers businesses to engage securely and seamlessly with their customers, and creates lasting value for our customers and partners.&nbsp; I want to express my deepest gratitude to my colleagues and partners at Uniken. Our collaborative efforts transformed the company and positioned it for long-term success, and I look forward to seeing you scale new heights.</p>



<figure class="wp-block-image size-large"><a href="https://blog.talkingidentity.com/wp-content/uploads/2025/02/scrabble_quote.jpg"><img loading="lazy" decoding="async" width="1024" height="412" src="https://blog.talkingidentity.com/wp-content/uploads/2025/02/scrabble_quote-1024x412.jpg" alt="Image of a scrabble board overlaid with the text &quot;Teamwork is proof that 'we' is always greater than 'me'—except in Scrabble.&quot;" class="wp-image-2335" srcset="https://blog.talkingidentity.com/wp-content/uploads/2025/02/scrabble_quote-1024x412.jpg 1024w, https://blog.talkingidentity.com/wp-content/uploads/2025/02/scrabble_quote-300x121.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2025/02/scrabble_quote-768x309.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2025/02/scrabble_quote-1536x617.jpg 1536w, https://blog.talkingidentity.com/wp-content/uploads/2025/02/scrabble_quote.jpg 2000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p></p>



<p>As for what’s next &#8211; that’s TBD. Digital identity has never been more critical, yet the challenges facing the industry have never been more complex. Let’s see what the next chapter brings.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Call Is About To Come From Inside The House</title>
		<link>https://blog.talkingidentity.com/2025/02/the-call-is-about-to-come-from-inside-the-house.html</link>
		
		<dc:creator><![CDATA[Nishant Kaushik]]></dc:creator>
		<pubDate>Mon, 03 Feb 2025 21:45:16 +0000</pubDate>
				<category><![CDATA[Insight IdM]]></category>
		<category><![CDATA[Agentic AI]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[Computer-Using Agent]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[OpenAI Operator]]></category>
		<guid isPermaLink="false">https://blog.talkingidentity.com/?p=2322</guid>

					<description><![CDATA[You would have to be living under a rock to have missed all the talk about Agentic AI, and how it is going to revolutionize the way we live and work. AI-powered agents will be anything and everything &#8211; from personal shopper to travel concierge, executive assistant to inventory manager, medical diagnostician to customer service [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>You would have to be living under a rock to have missed all the talk about <strong>Agentic AI</strong>, and <a href="https://hbr.org/2024/12/what-is-agentic-ai-and-how-will-it-change-work" target="_blank" rel="noreferrer noopener">how it is going to revolutionize the way we live and work</a>. AI-powered agents will be anything and everything &#8211; from personal shopper to travel concierge, executive assistant to inventory manager, medical diagnostician to customer service representative, software developer to security pentester. Article after article is devoted to <a href="https://scet.berkeley.edu/the-next-next-big-thing-agentic-ais-opportunities-and-risks/" target="_blank" rel="noreferrer noopener">both the opportunities and the risks</a>. And when it comes to risk, all of us working in the Digital Identity space are not prepared for what is coming.</p>



<figure class="wp-block-image size-large"><a href="https://blog.talkingidentity.com/wp-content/uploads/2025/02/growtika-nGoCBxiaRO0-unsplash-scaled.jpg"><img loading="lazy" decoding="async" width="1024" height="576" src="https://blog.talkingidentity.com/wp-content/uploads/2025/02/growtika-nGoCBxiaRO0-unsplash-1024x576.jpg" alt="" class="wp-image-2323" srcset="https://blog.talkingidentity.com/wp-content/uploads/2025/02/growtika-nGoCBxiaRO0-unsplash-1024x576.jpg 1024w, https://blog.talkingidentity.com/wp-content/uploads/2025/02/growtika-nGoCBxiaRO0-unsplash-300x169.jpg 300w, https://blog.talkingidentity.com/wp-content/uploads/2025/02/growtika-nGoCBxiaRO0-unsplash-768x432.jpg 768w, https://blog.talkingidentity.com/wp-content/uploads/2025/02/growtika-nGoCBxiaRO0-unsplash-1536x864.jpg 1536w, https://blog.talkingidentity.com/wp-content/uploads/2025/02/growtika-nGoCBxiaRO0-unsplash-2048x1152.jpg 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a><figcaption class="wp-element-caption">Photo by <a href="https://unsplash.com/@growtika?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash">Growtika</a> on <a href="https://unsplash.com/photos/an-abstract-image-of-a-sphere-with-dots-and-lines-nGoCBxiaRO0?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash">Unsplash</a></figcaption></figure>



<p>In the wake of OpenAI <a href="https://arstechnica.com/ai/2025/01/openai-launches-operator-an-ai-agent-that-can-operate-your-computer/" target="_blank" rel="noreferrer noopener">releasing <strong>Operator</strong></a>, a Computer-Using Agent (CUA), in research preview, I’ve read many breathless posts about the future of Web-based Agentic AI (as opposed to API-based Agentic AI), and how <span style="text-decoration: underline;">it makes every website “programmable”, even without APIs</span>. If you have worked in software development, you can visualize the mechanics easily &#8211; it’s like giving a QA Automation tool like Selenium WebDriver a brain, so that instead of just automating web applications for rinse-and-repeat testing, it can actually read the data, make decisions, adjust course, and take action. That framing should also make it easy to immediately grok how this will break the identity and security infrastructure we currently have, or are putting in place. I mean, we have been dealing with these in our QA Automation projects forever. I thought I&#8217;d share the thoughts that immediately jumped to my mind, mostly because I need to not be the only one worrying about these (#MiseryLovesCompany).</p>



<p><strong>1) Bypassing/Breaking/Compromising Authentication Mechanisms</strong></p>



<p>Since CUAs rely on web-based browsing, they necessarily run into some of the same break points that QA automation runs into &#8211; like multi factor authentication, bot verification techniques, and more. Any CUA would currently have to give the user back control of the browser to take these actions before proceeding. This high friction point is going to run head first into consumer dissatisfaction and business mandates to &#8220;just make it work&#8221;, and all of us in identity can guess exactly what will follow:</p>



<ul class="wp-block-list">
<li>Users will hand over passwords to their Agent service so it can log in as them, or grant them access to their password managers (probably as a feature getting built into first the browser password manager and then the generic password managers).</li>



<li>Users will turn off MFA to allow their agents to work.</li>



<li>Any guesses on what will happen to passkeys? If syncing of the private key was the worst that you thought could happen&#8230;.</li>



<li>There will people looking at how authorized session hijacking can become a feature to leverage, much like how Selenium allows direct manipulation of cookies and local storage, enabling agents to hoover up valid session tokens and bypass login screens. Case in point: <a href="https://github.com/JoshMayerr/passport-mcp" target="_blank" rel="noreferrer noopener">Build MCP servers for any website with automatic browser auth syncing</a></li>



<li>Just like Selenium can sometimes bypass automation (bot) detection protections using headless browsing and user-agent spoofing, expect Agentic AI tools to develop capabilities to do the same.</li>
</ul>



<p><strong>2) Violating Authorization Boundaries (When They Exist)</strong></p>



<p>QA Automation scripts often execute actions as a high-privilege test user (e.g., an admin account) to avoid breaking tests that are verifying functionality but not data or access restrictions. The rush to deploy Web-based Agentic AI tools will mean that like other tools of the past, it won’t be built with proper scope controls, thereby driving implementors to grant it excessive privileges. You can guess the rest.</p>



<p>As for consumer applications, those rarely have differentiated access control models built in for their users. That means a customer that wants to use a CUA, but limit what it can and cannot do will be out of luck. We saw this play out in the days of screenscraping-based personal finance applications, and how long it took for us to move everyone over to OAuth2 and FAPI as the better and more secure approach.</p>



<p><strong>3) Weakening Security Controls</strong></p>



<p>(<em>aka &#8220;Is that a DDoS attack, or an army of Agents here to take advantage of the limited time deal we announced?&#8221;</em>)</p>



<p>It won’t just be Authentication controls that are impacted. There are many security protections that will likely be obstacles in the path of Web-based Agentic AI. Would any of us be surprised to find out that IT teams were told to weaken or disable security mechanisms (e.g., Content Security Policy, SameSite cookies, Bot and DDoS detection) to facilitate automated agents, inadvertently creating vulnerabilities?</p>



<p>And these are just what immediately jumped to mind. I am sure there are many more that I&#8217;m not even thinking of.</p>



<p>Identity vendors and practitioners everywhere really need to shift into high gear to help organizations properly prepare for what’s headed their way. The demand to support Web-based Agentic AI will put a great deal of pressure on them to enable safe acceptance, and being the “Agent of No” (see what I did there) is not likely to go well. As for what can be done &#8211; more on that later.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
