Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/fd/3b/81/fd3b8192-a93b-c89b-d28d-4d85b8d0bcce/mza_7021196190885755347.jpg/600x600bb.jpg
The Deep Dive with Avistar.AI
Cyber Creative
9 episodes
1 day ago
Remember the Terminator movie line, "I'll be back...". They are everywhere, and most of them are invisible. Machine identities now outnumber human users by staggering margins and hold the keys to nearly every system, API, and cloud environment. They authenticate, connect, and decide faster than any person can react, and when compromised, they can bring entire networks down in seconds. This episode takes a hard look at how machine identities have become the new frontier of cyber risk. We explo...
Show more...
Technology
RSS
All content for The Deep Dive with Avistar.AI is the property of Cyber Creative and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Remember the Terminator movie line, "I'll be back...". They are everywhere, and most of them are invisible. Machine identities now outnumber human users by staggering margins and hold the keys to nearly every system, API, and cloud environment. They authenticate, connect, and decide faster than any person can react, and when compromised, they can bring entire networks down in seconds. This episode takes a hard look at how machine identities have become the new frontier of cyber risk. We explo...
Show more...
Technology
Episodes (9/9)
The Deep Dive with Avistar.AI
Rise of the Machine Identities: The New Cyber Risk Frontier
Remember the Terminator movie line, "I'll be back...". They are everywhere, and most of them are invisible. Machine identities now outnumber human users by staggering margins and hold the keys to nearly every system, API, and cloud environment. They authenticate, connect, and decide faster than any person can react, and when compromised, they can bring entire networks down in seconds. This episode takes a hard look at how machine identities have become the new frontier of cyber risk. We explo...
Show more...
1 day ago
15 minutes

The Deep Dive with Avistar.AI
Your Machines Have No Master: The Truth About NHI Ownership
Modern enterprises are run a vast number of humans, who have supervisors and managers alike. Conversely, in this new machine era your humans are outnumbered by more than 100 to 1, by machines that no one truly controls. Thousands of tokens, APIs, and automated accounts now hold the keys to data and systems, acting faster than humans can respond. Yet when something fails, no one can say who owns it, or who should fix it. This episode exposes the uncomfortable truth about Non-Human ...
Show more...
5 days ago
12 minutes

The Deep Dive with Avistar.AI
Knock, Knock. Who’s There? PAM! PAM Who? PAM Doesn’t Know the Machines.
Privileged Access Management has long been the backbone of securing human administrators, but when it comes to the expanding world of machine identities, PAM is knocking on the wrong door. In today’s cloud environments, thousands of service accounts, API keys, and automated agents operate outside its reach, shifting the identity landscape from a few people to countless machines. This episode explores why traditional PAM tools struggle to manage Non-Human Identities and why organizations need ...
Show more...
1 week ago
15 minutes

The Deep Dive with Avistar.AI
The ROI of NHI Security: Why Protecting Machine Identities Pays Off
Machine identities now outnumber humans across modern enterprises, yet they remain one of the most underprotected assets in cybersecurity. In this episode, we break down why securing Non-Human Identities (NHIs) from API tokens to service accounts, is not just a technical necessity, but an enterprise financial imperative. Drawing on real-world breaches at CircleCI and Okta, we explore how compromised machine credentials lead to multi-million dollar recovery costs and regulatory penalties under...
Show more...
1 week ago
15 minutes

The Deep Dive with Avistar.AI
The Cybersecurity Illusion: Breaches, Blind Spots, and the Truth About 2025
How do you sleep at night? 2025 is exposing a hard truth: cybersecurity isn’t keeping up. Breaches are being buried to protect reputations, attackers are hiding in plain sight using legitimate tools, and leadership confidence is dangerously disconnected from frontline reality. The result is an industry caught between perception and chaos. In this episode, we unpack the widening cracks in modern defense, from the silent breach epidemic to the illusion of control in an age of machine-speed thre...
Show more...
2 weeks ago
11 minutes

The Deep Dive with Avistar.AI
Supervising the Unsupervised: Rogue Risk and Agentic AI
Agentic AI is changing everything. These autonomous systems can plan, decide, and act on their own, creating power and risk at machine speed. In this episode, we uncover how this new wave of AI expands the attack surface through data poisoning, prompt injection, privilege escalation, and even synthetic media manipulation. Traditional defenses are no longer enough. The solution lies in treating AI agents as Non-Human Identities and managing them through identity-first security. We break down w...
Show more...
2 weeks ago
12 minutes

The Deep Dive with Avistar.AI
Cybersecurity Shifts: C-Suite and the AI Tidal Wave
As artificial intelligence transforms business, cybersecurity leaders are becoming key advisors to executives and boards. This episode explores how CISOs are shifting from being seen as blockers to strategic partners guiding organizations through the risks of rapid AI adoption. Featuring insights from a Wall Street Journal report and leaders at companies like Southwest Airlines and Ingersoll Rand, we examine how security teams are adapting to a faster, more complex landscape. We also look at ...
Show more...
3 weeks ago
11 minutes

The Deep Dive with Avistar.AI
The Hidden Threat: How Token Theft Undermines SaaS Security
In today’s cloud-first world, a new breed of cyberattack is quietly exploiting the weakest link in SaaS security: stolen OAuth and API tokens. This episode dives deep into how these invisible keys give attackers persistent access, allowing them to bypass MFA and traditional defenses entirely. Through real-world cases at Slack, CircleCI, and Cloudflare, we reveal how a single compromised token can unravel an organization’s entire security posture. We also unpack the growing issue of SaaS spraw...
Show more...
3 weeks ago
12 minutes

The Deep Dive with Avistar.AI
Securing Non-Human Identities: A Modern Approach
Non-Human Identities (NHIs), which include programmatic access credentials such as API keys and service accounts, have become the second most frequent and costliest attack vector. They now outnumber human employees by 92 to 1. Originally created by development teams to enable functionality, these critical credentials often exist outside the visibility or control of security teams, forming a vast and silent attack surface. This hidden risk is catastrophic. Exposed NHIs give adversaries an idea...
Show more...
1 month ago
5 minutes

The Deep Dive with Avistar.AI
Remember the Terminator movie line, "I'll be back...". They are everywhere, and most of them are invisible. Machine identities now outnumber human users by staggering margins and hold the keys to nearly every system, API, and cloud environment. They authenticate, connect, and decide faster than any person can react, and when compromised, they can bring entire networks down in seconds. This episode takes a hard look at how machine identities have become the new frontier of cyber risk. We explo...