Site icon VMVirtualMachine.com

Expert Consultant Details How to Secure the Machine Identity Attack Surface — Virtualization Review

Expert Consultant Details How to Secure the Machine Identity Attack Surface — Virtualization Review

By By David Ramel04/08/2026
Publication Date: 2026-04-08 00:00:00

In-Depth

Expert Consultant Details How to Secure the Machine Identity Attack Surface

Sergey Chubarov believes that as organizations add more automation, service integrations and software-driven workflows, security teams need to pay closer attention to the identities that are not tied to individual people. Service accounts, API keys and tokens rarely generate the same day-to-day scrutiny as user accounts, but they can quietly accumulate permissions, persist long after their original purpose has faded and become attractive targets for attackers.


“Without proper governance, then we will just have explosion of non human identities, NHI with lots of permissions.”

Sergey Chubarov, Consultant, Instructor and Conference Speaker

He shared those insights during his session today at the Identity at the Edge: Securing Access in the Age of AI online tech-education summit, which was presented by RedmondMag and is being made available for on-demand replay by Okta. Sergey’s presentation, “Securing Non-Human Identity: Bots, APIs, and Autonomous Agents in the AI Era,” concentrated less on AI agents themselves and more on the broader class of non-human identities already embedded across enterprise environments.

Sergey is a consultant, instructor and conference speaker whose…

Exit mobile version