In my previous article, I discussed common threats linked to Agentic AI systems. If you haven’t read it yet, I recommend doing so first, as it provides important context for this post. https://www.rebeladmin.com/securing-agentic-ai-part1-threat-overview/
In this blog post, I’ll be discussing threat modeling for Agentic AI. As I mentioned in my previous post, many of the threats relevant…
As we all know, AI is evolving at an incredible pace — sometimes it feels like we barely have time to catch our breath. The old ’10-year tech evolution cycle’ no longer applies; groundbreaking innovations are emerging faster than ever. One of the latest is Agentic AI. In fact, interest in the term ‘Agentic AI’ has skyrocketed, reaching its peak on Google search trends within just…
Entra ID Entitlement Management access packages enable administrators to offer a self-service experience for users, granting access to groups, applications, and sites. With access packages, we can automate the processes of access assignment, reviews, and expiration for the aforementioned resources. Previously, I have written detailed blog posts explaining how to set up access packages. You can…
In my previous blog post, I explained how to use Entra ID lifecycle workflow to trigger actions based on user attribute changes. You can find the step-by-step guide here: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes. In that post, I used an attribute assigned to a set of users to define the workflow scope. Now, we can also use Custom Security Attributes…