Latest blog posts from Tim
As AI agents take on actions once performed only by humans, traditional identity systems can’t provide clear delegation or accountability. StrongDM ID gives every agent a unique, verifiable identity linked to a human sponsor, ensuring organizations always know who authorized every action. In the next era of identity, authentication matters—but delegation defines trust.
StrongDM debuts in Gartner’s Magic Quadrant for PAM, redefining privileged access with real-time, policy-based authorization for modern cloud environments.
StrongDM debuts in Gartner’s Magic Quadrant for PAM, redefining privileged access with real-time, policy-based authorization for modern cloud environments.
AI agents act autonomously, not just as tools. Learn why enterprises need runtime governance to secure, observe, and control AI behavior in real time.
Most breaches don’t begin with hacking—they start with logging in. Discover how compromised credentials fuel modern cyberattacks and why Zero Trust Privileged Access is essential for securing today’s identity-driven environments.
I’ll spare you the “I drink your milkshake” tropes, but we all face a sobering reality: there will be breaches in 2025. Breaches aren’t a question of “if” anymore—they’re a question of “when” and “how bad.” It’s a foregone conclusion, like taxes or the 37th season of Grey’s Anatomy. But here’s the good news: knowing the inevitability of breaches gives us the perfect opportunity to prepare, if we have the will – and strategy – oh, and tools – to do it. And no, I’m not talking about the “build a
Yesterday, CyberArk announced a new partnership with Wiz, where they’re touting “complete visibility and control for cloud-created identities.” I know I’ve had my fun poking holes at CyberArk in the past, but with this announcement, they’ve just handed the world a glaringly tone-deaf admission of being outdated, un-innovative, and uninterested in what enterprise security teams actually want.
I'm continuously shocked by how poorly the PAM industry has treated customers to date. Shame on CyberArk, Delinea, and all the rest of you for persisting with such predatory models. The business model is "squeeze the blood out of them, then squeeze harder." The deployment model is "you'll never ...
I thought I had solved the biggest problems in the cloud, so I shifted into the background to watch the next evolutions of technology pass me by. I had the comfortable couch, the latest game console, and plenty of time to regret the true state of my adult gaming reflexes. I thought I was done. I was wrong.