NotebookLM alternative kills source caps

Posted in Commentary with tags on April 15, 2026 by itnerd

Recall, an AI encyclopedia that knows users better than the questions they ask, has launched version 2.0, an upgraded version of the original knowledge base.

It’s a major improvement on NotebookLM: Recall automatically captures and connects everything  the user consumes (think YouTube, podcasts, PDFs, TikToks, articles) to create a personal knowledge graph with no source caps. 

What’s new: Recall 2.0 also adds an agentic AI chat that queries both the open internet and a user’s private knowledge base in a single conversation, with model choice among Claude, GPT, and Gemini.

The tech is a direct answer for NotebookLM consumers who want a product that actually grows with them.

Since launching in 2022, Recall now boasts over 600,000 users, $1.1M ARR, and organic acquisition still accounts for roughly 80% of growth.

Recall did a post here that goes into the weeds on this.  

Cookeville Regional Medical Center warns 338,000 people of data breach

Posted in Commentary with tags on April 15, 2026 by itnerd

Comparitech is reporting that Cookeville Regional Medical Center in TN yesterday confirmed it notified over 337K people of a July 2025 data breach that compromised names, SSNs, financial account numbers, medical treatment info, health insurance info, and much more. 

Commenting on this is Rebecca Moody, Head of Data Research at Comparitech:

“This data breach becomes the eighth-largest on a US healthcare provider from 2025 (following a ransomware attack), and highlights how we often don’t realize just how extensive these attacks are until months (or sometimes years) after the event. It can take a considerable amount of time for organizations to investigate what data has been impacted in these breaches, which is why CRMC needs to be applauded for how it approached this attack. 

From the outset, CRMC has been honest about the nature of the incident and was open about the fact it had fallen victim to a ransomware attack at the time. It also confirmed that data had been breached within a couple of months of the attack taking place, while its investigations into exactly who had been involved were ongoing.

While some organizations avoid using the word “ransomware” and don’t issue any form of data breach notification for months, this lack of clarity and confirmation can leave those affected open to identity theft and phishing campaigns. Hopefully, many of the people impacted in this breach were aware of the attack in its early stages, so the letters being issued now are more of a formality than a shock.”

Stop me if you’re heard this before. Health care is a sector that is a prime target for threat actors. This needs to stop via providing this sector with what they need to stop getting pwned like this.

Sparq Designs Named Preferred Marketing Partner for Content Recovery Specialists

Posted in Commentary with tags on April 15, 2026 by itnerd

Sparq Designs (Sparq) has been named the Official Preferred Marketing Partner of Content Recovery Specialists (CRS). The collaboration was announced at the CRS 2026 Annual Conference and establishes Sparq as the approved local marketing execution partner for CRS franchise owners nationwide.

Through this affiliation, Sparq will support local marketing execution across CRS’s network of franchise locations, working within the systems and infrastructure already in place at the corporate level. By working within CRS’s existing HubSpot environment, Sparq will help ensure consistency, visibility, and alignment across all markets while enabling franchise owners to execute effective, localized campaigns.

Franchise owners can engage with Sparq based on their local market needs, within a structured, CRS-approved framework. At a minimum, services include local SEO support such as Google Business Profile optimization and Local Services Ads, ensuring a strong foundation for visibility and lead generation. Additional services include creative design and development, email marketing management, paid search campaigns, and organic marketing efforts.

All marketing initiatives will be executed within CRS’s current HubSpot infrastructure, allowing for seamless lead tracking, campaign integration, and performance visibility across the network.

CRS has built a strong national platform, but like many franchise organizations, it does not manage day-to-day marketing at the individual location level. Sparq fills that gap by providing structured, brand-approved marketing support without adding operational burden to the corporate team. Services will be delivered within CRS-approved engagement frameworks, allowing franchise owners to access scalable, compliant marketing solutions tailored to their local markets. 

For Sparq, the partnership reflects its continued focus on supporting franchise systems with practical, execution-driven marketing solutions. The agency specializes in translating national brand strategy into effective local execution, with services including local SEO, paid media, creative design, email marketing, and ongoing digital support—all delivered within established systems to ensure consistency, visibility, and measurable results across the network.

The partnership represents a national rollout and reinforces both organizations’ commitment to supporting franchise growth through aligned, scalable marketing execution. 

Auctor Raises $20M Led by Sequoia Capital to Build the AI System of Action for the Enterprise Software Implementation Market

Posted in Commentary with tags on April 15, 2026 by itnerd

Hundreds of billions are spent on software implementation each year*, yet 50 percent of projects fail to meet deadlines, and one out of every six exceeds budgets by over 200 percent*.

Today, Auctor emerges from stealth. It enables professional services teams and system integrators to deliver faster, more consistently, and smarter with every project.

Auctor has raised a total of $20 million, including a Series A led by Sequoia Capital with participation from M12, Microsoft’s Venture Fund, HubSpot Ventures, Workday Ventures, OneStream, Y Combinator, Tercera, and Dig Ventures.

Professional services and implementation teams still rely on a patchwork of meetings, spreadsheets, documents, and internal knowledge to manage discovery, scoping, solutioning, and delivery. As a result, requirements, decisions, and context are fragmented across systems and stakeholders, with no single source of truth. This fragmentation leads to misalignment, rework, margin erosion, and delayed time-to-value for customers.

Auctor’s AI-native system of action is purpose-built for how implementation work actually runs in practice. It curates execution-ready artifacts like rough orders of magnitude, resource plans, process flows, user stories, and more – already aligned and ready for delivery.

As a result, users and teams always know what was decided, why it was decided, and how it impacts the rest of the engagement. Most importantly, Auctor helps companies standardize what great looks like, turning their best work into repeatable, reusable practices across every project. 

Auctor is already seeing top teams across leading software ecosystems fundamentally change how they run implementations. Customers are driving upwards of 80% efficiency gains across discovery and design, improving margins and even shifting toward fixed-fee models. 

The results extend across the entire implementation lifecycle. One team used Auctor to respond to an RFP (request for proposal) over a single weekend with just one person, secured the opportunity, and closed it within two days — work that previously required weeks and multiple team members. Separately, a principal consultant at a large enterprise software company produced a comprehensive manufacturing scoping guide in roughly 10 minutes, replacing a three-week manual effort.

The market dynamics driving Auctor’s growth are structural. 

Implementation firms are caught between a talent model that doesn’t scale and a competitive environment that won’t wait. Senior consultants are spread too thin. Junior staff lack institutional knowledge. Mid-project swaps mean someone is always ramping up. The firms that figure out how to run leaner without sacrificing quality will take market share from those that don’t. 

For system integrators stuck in margin-constrained models where delivery costs scale linearly with headcount, the math is straightforward: Auctor can unlock multiple points of EBITDA margin by fundamentally changing the way of operating.

Astrolight contributes laser communication terminal technology to ESA’s HydRON Element 3 mission led by prime contractor Kepler Communications

Posted in Commentary with tags , on April 15, 2026 by itnerd

Kepler Communications is leading a group of industry partners, including Astrolight, a Lithuanian space and defense technology company developing laser communication solutions for space, ground, and maritime applications. The companies have been awarded a multimillion-euro contract under the European Space Agency’s (ESA) High-throughput Optical Network (HydRON) to develop HydRON’s user-terminal segment, known as Element 3. HydRON is a project under ESA’s Optical and Quantum Communications – Scylight programme, within the Agency’s Advanced Research in Telecommunications Systems (ARTES). Led by Kepler as the spacecraft provider and mission operator, Astrolight will provide its latest-generation ATLAS-X laser communication terminal for hybrid optical links across LEO, GEO, and ground.

The HydRON project aims to demonstrate the world’s first optical multi-orbit transport network in space, extending high-capacity, fibre-like connectivity into orbit and bolstering the resilience of European communications infrastructure through a secure, high-capacity, and interoperable optical data relay network.

HydRON’s Element 3 mission focuses on demonstrating the applications of laser communication technology within the user segment by creating a testing environment in real operating conditions. In the long term, it is intended to enable external commercial optical users to connect to the HydRON network and route their data through it.

As part of the mission, Astrolight’s ATLAS-X laser communication terminal will be hosted aboard a Kepler satellite for in-orbit demonstration. The mission will validate inter-satellite and space-to-ground links in LEO and attempt multi-orbit links between LEO and GEO. Following the demonstration, ATLAS-X will serve as a data relay node, enabling the Kepler spacecraft to connect with other elements of the HydRON network.

ATLAS-X is Astrolight’s next-generation low-SWaP (size, weight, and power) laser communication terminal, building on the company’s earlier ATLAS-1 and ATLAS-2 solutions. It is designed for both space-to-space and space-to-ground links and features a coarse pointing assembly, offering greater operational flexibility and easier deployment across a wider range of spacecraft. ATLAS-X is compatible with a subset of the ESA Specification for Terabit/sec Optical Links (ESTOL) standard and is SDA-compatible.

Bitdefender Launches Powerful Email Security Solution for Businesses and MSPs

Posted in Commentary with tags on April 15, 2026 by itnerd

Bitdefender today announced Bitdefender GravityZone Extended Email Security, unifying email and endpoint protection within a single platform. Built for organizations, managed service providers (MSPs) and their customers, it leverages an Integrated Cloud Email Security (ICES) approach to deliver continuous protection before and after delivery against modern email-borne threats including phishing, business email compromise (BEC), ransomware, impersonation, and insider-driven attacks.

“Email threats are growing more sophisticated and effective as total business email compromise-related payments crossed the $6 billion threshold in 2024”, according to Gartner®.¹ In a global survey of 1,200 IT and security professionals, 42% identified BEC as the greatest threat to their organization, while 66% reported an increase in these types of attacks.

Legacy email security solutions often focus on pre-delivery filtering, leaving gaps once threats reach user inboxes. Siloed email and endpoint security tools further create blind spots attackers exploit, increasing dwell time and delaying detection.

Bitdefender GravityZone Extended Email Security is a native email security solution that closes this gap by combining secure email gateway (SEG) filtering with API-based post-delivery protection. This dual-layer approach stops threats before delivery and continuously detects and remediates them after they reach inboxes, helping ensure complete protection across the email threat lifecycle. The solution builds on technology gained through Bitdefender’s acquisition of Mesh Security, further strengthening its email protection capabilities.

Fully integrated into Bitdefender GravityZone, the company’s unified security, risk analytics, and compliance platform, GravityZone Extended Email Security extends protection from endpoint to inbox. It integrates seamlessly into existing environments, enabling rapid deployment and time to value.

Key Benefits of GravityZone Extended Email Security include:

  • Unified email and endpoint protection – GravityZone Extended Email Security uses artificial intelligence (AI) and real-time threat intelligence to stop phishing, BEC, impersonation, ransomware, and other advanced threats. Emails are inspected before delivery and continuously monitored after delivery, enabling automated quarantine and remediation to reduce dwell time and limit user exposure.
  • Consolidates tools and reduces security team workload – The platform streamlines security management by unifying tools and automating detection and response across the email attack chain. Continuous monitoring and automated remediation reduce manual effort and improve response times.
  • Improves efficiency and scales security operations – Built for modern environments and service delivery models, GravityZone Extended Email Security enables efficient, scalable security for businesses and MSPs. Centralized management, continuous policy enforcement, and streamlined workflows support multi-tenant environments and simplify security across distributed infrastructures.
  • Fast, flexible deployment across any environment – Organizations and MSPs can deploy the solution as a SEG across Microsoft 365, hybrid, and diverse environments, with API-based and combined deployment models supported for Microsoft 365.

Availability

Bitdefender GravityZone Extended Email Security is available now as an add-on to GravityZone endpoint security deployments. For more information, visit here.

¹Gartner, How to Develop an Email Security Strategy, Max Taggett, Nikul Patel, August 20, 2025.

Gartner is a registered trademark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved.

CSA issues “Building a Mythos-ready Security Program”

Posted in Commentary with tags on April 15, 2026 by itnerd

“The ‘AI Vulnerability Storm’: Building a Mythos-ready Security Program” was just issued by the Cloud Security Alliance (CSA) CISO Community, co-authored with SANS, [un]prompted, the OWASP Gen AI Security Project and several CISOs. (See direct links at bottom.)

The Strategy Brief recognizes the increased likelihood of attackers discovering new vulnerabilities, creating new exploits, and using them in complex automated attacks at scale, offers advice for dealing with the spike in risk, and offers some immediate steps to ready organizations for the next waves of threats.

Some industry experts have provided commentary below.

George McGregor, VP, Approov (mobile app security expert):

    “While it’s good to raise visibility and encourage CISOs to have a “Mythos ready plan”, the CSA briefing is far from complete in terms of what that plan must contain, and doesn’t give a sense of the priorities of different steps which should be taken.

   “For example, the focus on accelerating finding and patching vulnerabilities (by using AI!)  may take too much time to be effective, and improved incident management is laudable but doesn’t address the immediate problem either.

   “The briefing does mention reviewing identity and access management  – that should be strengthened AND should include an enhanced focus on urgently putting in place additional methods to STOP vulnerabilities being exploited in the short term.

   “There are appropriate and effective Zero Trust approaches which should be put in place immediately, and this should be the first priority  – specifically,  run-time app and device attestation can block AI agents and permit the validation of every request at APIs and defend against API vulnerability exploitation.”

Sunil Gottumukkala, CEO of Averlon:

   “It’s awesome to see so many industry leaders coming together to produce this guide under time pressure. The operational framing, risk register, and board-level talking points are genuinely useful.

   “However, some diagnostic questions address the wrong near-term problem.  The report focuses in part on whether the organization is using AI, whether employees have coding agent access, and whether they can contribute to open source. These are legitimate AI governance questions, but they’re largely irrelevant to the impending crisis. The threat from Mythos is external. Vulnerabilities are about to land in software every organization depends on, regardless of whether that organization has embraced AI internally or banned it. The diagnostic should ask: Can you patch critical systems in near real time? Do you have the ability to assess exploitability of a given vulnerability within your organization? Do you have a complete software inventory including dependencies? Can your team sustain a surge in patching and malicious activity simultaneously? Do you have pre-authorized containment actions? Those questions determine whether an organization survives the next wave. The AI adoption questions belong later, as enabling steps for longer-term resilience, not as the opening diagnostic.

  “In terms of priorities, the strategy report leads with “Point Agents at Your Code and Pipelines” and “Require AI Agent Adoption”- two steps that are premature for most organizations. The first vulnerabilities to hit won’t be in proprietary code at the onset. They’ll be in vendor software and open source components that organizations consume.

   “The fifth, seventh and eighth priorities (Continuous Patching and Inventory, Reducing Attack Surface and Hardening Your Environment), and the 11th (VulnOps) directly address the incoming threat and should be considered first. AI tooling accelerates all of these, but it doesn’t replace any of them.

   “The report correctly identifies AI adoption as how defenders close the gap long-term, but sequencing should reflect what CISOs need first: know what you have, patch it fast, harden what you can’t patch, and build the operational muscle to sustain that pace.”

Doc McConnell, Head of Policy, Finite State (former CISA Branch Chief, former Senior Advisor for Cybersecurity Policy, Office of Management and Budget [OMB], Executive Office of the President):

   “The scenarios that Mythos enables aren’t routine. AI is a ratchet wrench for cybersecurity—it only goes in one direction: faster. It enables security teams to respond to incidents more quickly, but as the CSA report lays out, it also increases the volume and severity of those incidents.

   “Sure, the basics still apply – building security into the product lifecycle, accelerating the patch cycle, making sure that cybersecurity is central to your company’s risk management and long-term strategy. What’s changed is that the traditional advice to “do the basics, but faster” is no longer sufficient. The report is right – regardless of how skilled your technical team, humans simply can’t go fast enough to keep up with AI.

   “We work primarily with connected device manufacturers – companies that are building the technology that underpins critical infrastructure, manufacturing, medical devices. Mythos is particularly important for those types of devices, because malfunctions or malicious behavior can cost lives.

   “Here are three things I believe companies must do.

   “First, security has to move to the very beginning of the product lifecycle. If you’re waiting until a CVE drops to find out whether your product is affected, you’re already behind. Binary analysis and software composition analysis need to happen continuously from the very first stages of design and development – not as a “final check” when the features are final and the release is scheduled.

   “Second, security needs to keep pace with product development, even as companies accelerate development with AI. That means a real-time SBOM, with automated reachability analysis for new vulnerabilities so that they can confidently prioritize the fixes that matter most.

   “Finally, companies need to understand that even in a capable security environment, incidents will still happen. When they do, defenders need to match attacker speed. That means an automated vulnerability and incident response capability that can triage, communicate, and coordinate remediation across a product portfolio without relying on manual investigation at each step. The EU Cyber Resilience Act assumes that companies will have this kind of capability in place when its vulnerability and incident reporting requirements come into force in September of this year.

   “Companies need to act on this immediately: make it the top topic at your next Board meeting. If you don’t have this capability today, partner with a company that does. I applaud Anthropic and its partners in Project Glasswing for their approach to finding and fixing vulnerabilities. But we have to assume that if Anthropic is doing this loudly and responsibly, someone else is doing it quietly – and they may not have any interest in disclosing what they find.”

Uzair Gadit, CEO, Secure.com (developer of AI-native Digital Security Teammates) :

    “Mythos isn’t introducing new classes of risk, it’s compressing the time it takes to exploit them. That is a different problem entirely. The industry keeps responding with better checklists, but the issue isn’t coverage, it’s decision speed.”

    “Mythos is the first credible signal that vulnerability discovery is shifting from human-paced to machine-paced. Most organizations’ defenses aren’t built for or ready for that.

    “The CSA guidance is appropriate but reads like an incremental response to what is absolutely a non-incremental shift. The issues is applying steady-state security thinking to a system that is accelerating. That mismatch is where the risk sits. If your response to Mythos looks like your response to last year’s threats, you’re already behind.

   “Mythos hype vs. reality:  there’s likely some hype in the claims, but not in the direction in which cybersecurity’s traveling, and that distinction matters. Remember that the evidence isn’t fully public yet, so while some skepticism is justified, dismissing the threat certainly isn’t. True, some of the fear may be amplified, but it’s anchored in a real shift. This isn’t synthetic panic. FUD fills the gap when validation lags capability. That’s exactly where we are right now.” 

   ““The constraint for defenders used to be finding issues, but now, it’s deciding what to fix, in what order, and deciding and doing it fast enough. Security teams are about to be measured on response velocity, not just coverage. Automated response with humans in the loop is about to become the minimum table stakes.”

   “Security teams must stop optimizing for visibility and start optimizing for decision speed. The strongest security posture’s architecture will connect detection, prioritization, and action into a single loop.” 

Noelle Murata, Chief Operating Officer, Xcape, Inc.

   “The emergence of Claude Mythos is not a routine product launch; it is a phase change that renders our current human-centric defense models mathematically obsolete. While the industry is used to the steady drip of vulnerabilities, we have never faced a scenario in which an autonomous model can chain exploits and identify thousands of zero-day flaws across every major OS in minutes, including a 27-year-old OpenBSD bug that survived decades of elite manual audits. The Y2K comparison is flawed because Y2K had a fixed deadline; Mythos represents a permanent, exponential acceleration. This is not a sales ploy or hype; it is a documented leap where a model outperformed human experts on the Firefox attack surface by a factor of 90.

   “For security teams, responding with routine patching is a recipe for catastrophic failure. We must get creative and move beyond symmetrical AI defense. This means adopting deceptive infrastructure – deploying AI-generated honey-tokens and dynamic network paths that shift faster than a model can map them – and shifting from periodic scanning to continuous, agent-led remediation. We are entering an era where the only way to survive the speed asymmetry of a sub-24-hour exploit cycle is to automate the defense so thoroughly that the attacker is forced to hack a moving target. This is an issue of asymmetric cyber warfare.  The adversary has to be successful once, whereas the defenders must be successful every time.

   “My takeaway: If your current vulnerability management strategy still involves a human clicking “Approve” on a Tuesday morning, you aren’t defending a network; you are managing a museum.”

If you want a look at this, you can sign up to download the paper here.

April Patch Tuesday Commentary From Fortra

Posted in Commentary with tags on April 14, 2026 by itnerd

By Tyler Reguly, Associate Director, Security R&D, Fortra

With 165 Microsoft CVEs and another 82 non-Microsoft CVEs combining for a total of 247 CVEs, I can’t help but wonder who angered Microsoft this month. Here’s hoping that admins everywhere are well hydrated with snacks available because I feel like this mess will take a few days to fully detangle.

There are two vulnerabilities that Microsoft has called out as either exploited or disclosed. The first, CVE-2026-32201, is a spoofing vulnerability in Microsoft SharePoint that is seeing active exploitation. SharePoint can definitely be one of the harder systems to patch and maintain, so admins are going to want to pay close attention to this one. The second is CVE-2026-33825, an elevation of privilege vulnerability in Microsoft Defender, which Microsoft has listed as publicly disclosed. This appears to be the BlueHammer vulnerability that everyone was talking about, which Fortra has written about in detail.

Two things caught my attention this month.

The first is that there are 19 vulnerabilities listed as Exploitation More Likely. In the first quarter of the year, we saw 20 vulnerabilities listed as Exploitation More Likely and now, in a single month, we’re seeing only one less than that total. That is something to pay attention to, especially given the nature of the services affected.

The second is a pair of TCP/IP vulnerabilities. It is rare that you see a truly remote TCP/IP vulnerability these days and that’s exactly what CVE-2026-33827 is… unauthorized, network-based code execution against IPv6. The attack complexity is listed as high because the vulnerability is based on a race condition as well as “additional actions”, as Microsoft calls it, but it is still impressive to see these vulnerabilities identified in 2026.

Based on acknowledgements, the team that found the TCP/IP vulnerability, WARP & MORSE team at Microsoft, also found this month’s only CVSS 9.8 vulnerability. Microsoft has labeled it as Exploitation Less Likely, but it is the infamous network remote code execution vulnerability. In this case, Internet Key Exchange (IKE) v2 is impacted and a remote attacker could trigger remote code execution. Importantly here, we’re not talking about the fake remote code execution that Microsoft uses for Office documents and similar, we’re talking about a legitimate, over the network remote code execution.

For CISOs this month, I’d be more worried about the sheer quantity of items that admins are having to review. There are a lot of CVEs and a lot of one-offs that we don’t normally see. While Windows update and automatic updates for some applications will take care of a lot of the heavy lifting here, there’s still testing that is required before deploying updates this large. Additionally, with the likes of .NET, SharePoint, and SQL Server, there’s always the potential for difficult patches and/or version incompatibility that may crop up during testing.

Patience is going to be a keyword this month, followed very quickly by resourcing. Massive patch drops like this and the conversation around next-gen LLMs means that we need to be aware of the pressure on our teams and the amount of work they are expected to complete. If you still see your security teams as a cost centre, it is time to start rethinking that and looking at the value they bring to protecting your data and your systems. Large patch drops mean that you really need to review your teams to ensure they are adequately resourced.

Guardsquare to Address the Growing Piracy Risk Targeting Streaming Apps at NAB Show Las Vegas

Posted in Commentary with tags on April 14, 2026 by itnerd

Guardsquare will present at NAB Show Las Vegas on Monday, April 20, in the Tech Chat Theater at the Las Vegas Convention Center. In a session titled “When Your Streaming App Is the Attack Surface: Stopping Piracy at the Source,” Guardsquare will examine how attackers increasingly target mobile streaming applications to bypass traditional content protection controls.

WHAT: Guardsquare Tech Chat Session at NAB Show Las Vegas
WHEN: Monday, April 20, 2026 | 2:00 – 2:30 PM
WHERE: Tech Chat Theater (W1242), West Hall, Las Vegas Convention Center

Streaming platforms have invested heavily in DRM, watermarking, and backend protections to safeguard premium content. Yet piracy and revenue abuse continue to grow, often without attackers ever touching the video stream itself. Instead, attackers increasingly target the mobile app through repackaged binaries, modified playback logic, credential harvesting, and direct API abuse.

During this Tech Chat session, Amanda Sutliff, Director of Product Marketing at Guardsquare, will explore how attackers manipulate client-side applications to bypass traditional protections and how media and streaming providers can close this gap by protecting app integrity, detecting runtime abuse, and validating trust before content is delivered.

“Streaming providers have invested heavily in protecting the stream, but attackers increasingly exploit the mobile app itself,” said Sutliff. “By protecting app integrity and detecting tampering at runtime, streaming platforms can stop piracy earlier in the attack chain while preserving the viewer experience.”

In addition to the presentation, Guardsquare will be exhibiting at Booth #W1459 during NAB Show 2026. For more information about the event, visit https://www.nabshow.com/las-vegas/.

Today is Identity Management Day

Posted in Commentary on April 14, 2026 by itnerd

Today is Identity Management Day and this year’s theme is “Finding Identity: The Search for You, Me, and the Machines,” reflecting the reality that machine and agentic identities now vastly outnumber human ones.

Identity Management Day used to be a useful prompt to remind people to turn on two-factor authentication and audit their passwords. However, this year, the more urgent conversation is one most organizations haven’t had yet: do you know who, or what, actually has access to your systems?

Commenting on this is Dan Moore, Sr. Director, CIAM Strategy & Identity Standards at FusionAuth

“Machine and agentic identities now vastly outnumber human identities, dramatically expanding the attack surface. Every AI agent, every automated pipeline, every API key, and every service account is an identity. And unlike a human employee, these identities don’t get offboarded when a project ends. Instead, they accumulate, quietly persisting in the systems, rarely seeing the same level of scrutiny as a human login. 

This year’s Identity Management Day theme – Finding Identity: The Search for You, Me, and the Machines – captures this challenge well. Identity is about governing how humans, machines, and intelligent systems interact securely and at scale.

For businesses building or scaling digital products, this has a very practical implication. The identity layer is now the security perimeter. Breaches are often caused by someone (or something) using a legitimate identity to walk through the front door. Stale credentials, over-permissioned service accounts, and machine identities with no defined lifecycle are where the real risk lives. 

The good news is that getting this right doesn’t require starting from scratch. It requires treating identity infrastructure with the same intentionality as any other critical system, instead of an afterthought.”

UPDATE Cameron Matthews, CISO, Radiant Logic adds this comment:

“Identity Management Day is a timely reminder that identity has become the primary control plane for modern security, especially as organizations expand across cloud, SaaS, and now AI-driven environments. The challenge is that most enterprises are still operating with fragmented identity data, making it difficult to see who has access to what, and whether that access is appropriate or risky. This lack of visibility creates blind spots that attackers increasingly exploit, particularly as non-human identities and automated processes multiply. To address this, organizations need to move beyond static identity governance and embrace continuous identity observability that provides real-time insight into access, behavior, and risk. Ultimately, treating identity as a dynamic, data-driven layer of security is imperative to enable Zero Trust to function as intended in today’s environment.”