AI, Identity And The Cybersecurity Risk
Attackers still log in. For years, credential theft through phishing has been one of the most persistent and damaging threats to modern organizations, not because it is sophisticated, but because it works.
Attackers still log in. For years, credential theft through phishing has been one of the most persistent and damaging threats to modern organizations, not because it is sophisticated, but because it works.
What started as a Friday afternoon experiment turned into something we actually use. I built a multi-agent AI system for Fortytwo — a 40+-person cloud expert firm — over a weekend. Time tracking, revenue reporting, infrastructure monitoring. A real internal PoC on a real business. This is what worked, what didn’t, and what genuinely caught me off guard.
You want to let teams build and use agents without creating a parallel identity estate you cannot explain, audit, or shut down. You want autonomy with boundaries, and speed with accountability.
AI agents are moving from experiments to infrastructure. They read, decide, and act. Sometimes in response to a human. Sometimes on their own.