<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>EnforceAuth Blog</title><description>Authorization patterns, migration guides, and security best practices from the EnforceAuth team.</description><link>https://enforceauth.com/</link><language>en-us</language><item><title>Authentication vs. Authorization for AI Agents: Why Your Identity Stack Stops at the Door</title><link>https://enforceauth.com/blog/authentication-vs-authorization-for-ai-agents/</link><guid isPermaLink="true">https://enforceauth.com/blog/authentication-vs-authorization-for-ai-agents/</guid><description>Your identity provider can prove an AI agent is who it claims to be. That tells you nothing about whether it should have just read the customer table.</description><pubDate>Mon, 18 May 2026 00:00:00 GMT</pubDate><category>Authorization</category><author>Mark Rogge, CEO</author></item><item><title>The Buyer&apos;s Guide to AI Agent Authorization: 5 Criteria That Separate Real Enforcement from Detection</title><link>https://enforceauth.com/blog/buyers-guide-ai-agent-authorization-five-criteria/</link><guid isPermaLink="true">https://enforceauth.com/blog/buyers-guide-ai-agent-authorization-five-criteria/</guid><description>Most AI security tools you&apos;ll evaluate this quarter cannot stop an agent from doing something it shouldn&apos;t. They can tell you it happened. That gap is the entire buying decision.</description><pubDate>Mon, 18 May 2026 00:00:00 GMT</pubDate><category>AI Security</category><author>Mark Rogge, CEO</author></item><item><title>Closing the Authorization Gap in Autonomous AI Agents: A Runtime Authorization Architecture for Agentic AI, Applied to the ROME Incident</title><link>https://enforceauth.com/blog/closing-the-authorization-gap-rome-whitepaper/</link><guid isPermaLink="true">https://enforceauth.com/blog/closing-the-authorization-gap-rome-whitepaper/</guid><description>In December 2025, Alibaba&apos;s ROME agent opened a reverse SSH tunnel out of training, scanned its internal network, and mined cryptocurrency on its GPUs. The fix is runtime authorization, not better training.</description><pubDate>Mon, 18 May 2026 00:00:00 GMT</pubDate><category>Whitepaper</category><author>Mark O. Rogge, Founder &amp; CEO</author></item><item><title>The Authorization Gap That Took Canvas Offline</title><link>https://enforceauth.com/blog/authorization-gap-canvas-offline/</link><guid isPermaLink="true">https://enforceauth.com/blog/authorization-gap-canvas-offline/</guid><description>Canvas wasn&apos;t breached by a missing patch or a stolen password. It was breached because a low-trust workflow could perform high-trust actions. Every multi-tenant SaaS has the same gap.</description><pubDate>Wed, 13 May 2026 00:00:00 GMT</pubDate><category>Industry Analysis</category><author>Mark Rogge, CEO</author></item><item><title>The Four Serious Frameworks: Authorization as the Load-Bearing Surface of Modern Security Programs</title><link>https://enforceauth.com/blog/four-serious-frameworks-authorization-load-bearing-surface/</link><guid isPermaLink="true">https://enforceauth.com/blog/four-serious-frameworks-authorization-load-bearing-surface/</guid><description>Volume I of EnforceAuth&apos;s analyst briefing series. Four prescriptive frameworks — the flywheel, shift down, resilience engineering, and the Control Pressure Index — extending Phil Venables&apos;s master class to the authorization control surface.</description><pubDate>Wed, 13 May 2026 00:00:00 GMT</pubDate><category>Whitepaper</category><author>Mark Rogge, CEO</author></item><item><title>We Open-Sourced Zift: A Code Scanner for the Authorization Gap</title><link>https://enforceauth.com/blog/enforceauth-ap-news-wire/</link><guid isPermaLink="true">https://enforceauth.com/blog/enforceauth-ap-news-wire/</guid><description>Press release: we open-sourced Zift under Apache 2.0. It scans your code, finds the authorization decisions buried in it, and emits OPA-ready Rego stubs. AP wire link inside.</description><pubDate>Wed, 06 May 2026 00:00:00 GMT</pubDate><category>Press Release</category><author>EnforceAuth, Inc.</author></item><item><title>Introducing Zift: Open-Source Authorization Code Scanner</title><link>https://enforceauth.com/blog/open-sourcing-zift-authorization/</link><guid isPermaLink="true">https://enforceauth.com/blog/open-sourcing-zift-authorization/</guid><description>Introducing Zift, an open-source authorization code scanner. It finds every access decision in your codebase and calculates your externalization percentage.</description><pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate><category>Open Source</category><author>Mark Rogge, CEO</author></item><item><title>The HIPAA Security Rule Finalization Is Coming in May 2026. Your AI Authorization Gap Is Already Here.</title><link>https://enforceauth.com/blog/hipaa-security-rule-2026-ai-authorization-gap/</link><guid isPermaLink="true">https://enforceauth.com/blog/hipaa-security-rule-2026-ai-authorization-gap/</guid><description>A compliance deadline disguised as a cybersecurity update. What the May 2026 HIPAA Security Rule finalization will force every healthcare CISO to prove about their AI systems — and the 90-day readiness path.</description><pubDate>Wed, 29 Apr 2026 00:00:00 GMT</pubDate><category>Whitepaper</category><author>EnforceAuth, Inc.</author></item><item><title>Credential Harvesting and the Authorization Gap in Financial Services</title><link>https://enforceauth.com/blog/credential-harvesting-authorization-gap-financial-services/</link><guid isPermaLink="true">https://enforceauth.com/blog/credential-harvesting-authorization-gap-financial-services/</guid><description>Why authentication fails after phishing — and how continuous authorization enforcement closes the gap. A technical analysis grounded in the April 2026 RBC Direct Investing campaign.</description><pubDate>Sat, 25 Apr 2026 00:00:00 GMT</pubDate><category>Whitepaper</category><author>EnforceAuth, Inc.</author></item><item><title>A Reference Architecture for Continuous Authorization of AI Agents</title><link>https://enforceauth.com/blog/continuous-authorization-reference-architecture/</link><guid isPermaLink="true">https://enforceauth.com/blog/continuous-authorization-reference-architecture/</guid><description>A 5-layer reference model for enforcing authorization on AI agents across apps, infrastructure, data, and AI workloads.</description><pubDate>Thu, 23 Apr 2026 00:00:00 GMT</pubDate><category>AI Security</category><author>Mark Rogge, CEO</author></item><item><title>The Authorization Gap, Quantified: What Wiz&apos;s State of AI in the Cloud 2026 Tells Every CISO</title><link>https://enforceauth.com/blog/authorization-gap-quantified-wiz-state-of-ai-cloud-2026/</link><guid isPermaLink="true">https://enforceauth.com/blog/authorization-gap-quantified-wiz-state-of-ai-cloud-2026/</guid><description>Wiz measured the surface area. The enforcement layer underneath is what determines whether your AI program survives an audit — or a breach. A CISO brief on the data and what to do about it.</description><pubDate>Wed, 22 Apr 2026 00:00:00 GMT</pubDate><category>Whitepaper</category><author>EnforceAuth Team</author></item><item><title>The Authorization Gap in Agentic Commerce: A Technical Analysis</title><link>https://enforceauth.com/blog/authorization-gap-agentic-commerce/</link><guid isPermaLink="true">https://enforceauth.com/blog/authorization-gap-agentic-commerce/</guid><description>When a consumer types &quot;restock my kitchen essentials&quot; and a transaction completes without a webpage loading, enterprise security architecture has changed. A technical analysis of the authorization gap in agentic commerce.</description><pubDate>Sat, 18 Apr 2026 00:00:00 GMT</pubDate><category>Whitepaper</category><author>Mark Rogge, CEO</author></item><item><title>The Authorization Gap: A Reference Architecture for Continuous, Policy-as-Code Authorization</title><link>https://enforceauth.com/blog/authorization-gap-reference-architecture-whitepaper/</link><guid isPermaLink="true">https://enforceauth.com/blog/authorization-gap-reference-architecture-whitepaper/</guid><description>Why authentication, RBAC, and static IAM cannot secure the agentic enterprise — and the reference architecture for continuous, policy-as-code authorization across applications, infrastructure, data, and AI workloads.</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>Whitepaper</category><author>EnforceAuth, Inc.</author></item><item><title>NIST&apos;s AI Agent Standards Initiative and the Authorization Imperative</title><link>https://enforceauth.com/blog/nist-ai-agent-standards-authorization-imperative/</link><guid isPermaLink="true">https://enforceauth.com/blog/nist-ai-agent-standards-authorization-imperative/</guid><description>Why interoperable, secure agentic AI demands continuous authorization enforcement — and how to close the gap before NIST standards become mandates.</description><pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate><category>Whitepaper</category><author>Mark O. Rogge, CEO</author></item><item><title>Okta for AI Agents Covers the Front Door. The Building Is Still Ungoverned.</title><link>https://enforceauth.com/blog/okta-for-ai-agents-authorization-gap-remains/</link><guid isPermaLink="true">https://enforceauth.com/blog/okta-for-ai-agents-authorization-gap-remains/</guid><description>Okta for AI Agents goes GA April 30. A well-built identity product that leaves runtime authorization enforcement completely unaddressed.</description><pubDate>Thu, 09 Apr 2026 00:00:00 GMT</pubDate><category>AI Security</category><author>Mark Rogge, CEO</author></item><item><title>EnforceAuth vs. OpenClaw: An Issue-by-Issue Analysis of Agentic AI Security</title><link>https://enforceauth.com/blog/enforceauth-vs-openclaw-issue-by-issue-analysis/</link><guid isPermaLink="true">https://enforceauth.com/blog/enforceauth-vs-openclaw-issue-by-issue-analysis/</guid><description>A direct mapping of every structural security failure raised in the OpenClaw analysis to the specific EnforceAuth capability that resolves it — visibility, inherited identity, prompt injection, supply chain, and the missing security control plane.</description><pubDate>Wed, 08 Apr 2026 00:00:00 GMT</pubDate><category>Whitepaper</category><author>EnforceAuth, Inc.</author></item><item><title>Closing the Financial Services Authorization Gap</title><link>https://enforceauth.com/blog/closing-the-financial-services-authorization-gap/</link><guid isPermaLink="true">https://enforceauth.com/blog/closing-the-financial-services-authorization-gap/</guid><description>Why unified, continuous authorization is the defining security imperative for banks, capital markets, insurance carriers, and fintech in the AI era.</description><pubDate>Tue, 07 Apr 2026 00:00:00 GMT</pubDate><category>Whitepaper</category><author>Mark Rogge, CEO</author></item><item><title>NVIDIA Got a Standing Ovation for Building Half the Solution</title><link>https://enforceauth.com/blog/nvidia-gtc-openshell-authorization-gap/</link><guid isPermaLink="true">https://enforceauth.com/blog/nvidia-gtc-openshell-authorization-gap/</guid><description>OpenShell delivered strong runtime sandboxing at GTC. But once an AI agent is inside your enterprise, who decides what it&apos;s authorized to do? That question went unanswered.</description><pubDate>Mon, 06 Apr 2026 00:00:00 GMT</pubDate><category>AI Security</category><author>EnforceAuth, Inc.</author></item><item><title>Okta Just Validated a $12B Market — and Revealed the Gap They Can’t Fill</title><link>https://enforceauth.com/blog/okta-validated-12b-market-authorization-gap/</link><guid isPermaLink="true">https://enforceauth.com/blog/okta-validated-12b-market-authorization-gap/</guid><description>Okta&apos;s Q4 FY2026 earnings show $876M in revenue and major investments in agentic AI identity. But their own research exposes a harder truth: 89% of enterprises deploy AI agents, and only 10% govern what those agents actually do after they authenticate.</description><pubDate>Sat, 04 Apr 2026 00:00:00 GMT</pubDate><category>AI Security</category><author>Mark Rogge, CEO</author></item><item><title>An Analyst Mapped the Agent Identity Market. Here&apos;s What He Found.</title><link>https://enforceauth.com/blog/strategy-of-security-agent-identity-validates-enforceauth/</link><guid isPermaLink="true">https://enforceauth.com/blog/strategy-of-security-agent-identity-validates-enforceauth/</guid><description>Cole Grolmus spent months mapping the AI agent identity market. His findings validate what we&apos;re building and expose the gap most vendors hope you won&apos;t notice.</description><pubDate>Sat, 04 Apr 2026 00:00:00 GMT</pubDate><category>AI Security</category><author>EnforceAuth</author></item><item><title>Closing the Authorization Gap: How EnforceAuth Brings Identity-Aware Security to NVIDIA OpenShell</title><link>https://enforceauth.com/blog/closing-the-authorization-gap-enforceauth-brings-identity-aware-security-to-nvidia-openshell/</link><guid isPermaLink="true">https://enforceauth.com/blog/closing-the-authorization-gap-enforceauth-brings-identity-aware-security-to-nvidia-openshell/</guid><description>Why &quot;polite&quot; AI isn&apos;t the same as secure AI — and how EnforceAuth closes the gap that execution sandboxes alone can&apos;t.</description><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><category>Enterprise Security</category><author>EnforceAuth, Inc.</author></item><item><title>Onyx Security’s $40M Round Validates AI Agent Security — But Who’s Enforcing Authorization?</title><link>https://enforceauth.com/blog/onyx-40m-control-plane-enforcement-layer/</link><guid isPermaLink="true">https://enforceauth.com/blog/onyx-40m-control-plane-enforcement-layer/</guid><description>Onyx Security just raised $40M to build a behavioral control plane for AI agents. It’s a smart bet on a real problem. But behavioral oversight and authorization enforcement are two different questions, and the security stack needs both answers.</description><pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate><category>Industry Analysis</category><author>Mark Rogge, CEO</author></item><item><title>Fortinet Just Confirmed What We&apos;ve Been Saying. Here&apos;s What They Can&apos;t Fix.</title><link>https://enforceauth.com/blog/fortinet-confirmed-authorization-gap/</link><guid isPermaLink="true">https://enforceauth.com/blog/fortinet-confirmed-authorization-gap/</guid><description>FortiAI 8.0 makes AI security the centerpiece of Fortinet&apos;s flagship OS. But everything it does stops at the perimeter. The real question, what an AI agent is authorized to do once it is inside, remains unanswered.</description><pubDate>Wed, 11 Mar 2026 00:00:00 GMT</pubDate><category>AI Security</category><author>Mark Rogge, CEO</author></item><item><title>Gartner Just Confirmed What We&apos;ve Been Saying: AI Governance Without Authorization Is a $1 Billion Blind Spot</title><link>https://enforceauth.com/blog/gartner-ai-governance-authorization-blind-spot/</link><guid isPermaLink="true">https://enforceauth.com/blog/gartner-ai-governance-authorization-blind-spot/</guid><description>Gartner projects AI governance spending will surpass $1 billion by 2030. But the headline numbers miss the most critical layer: the Authorization Gap between observing AI behavior and enforcing what AI is allowed to do.</description><pubDate>Thu, 26 Feb 2026 00:00:00 GMT</pubDate><category>AI Governance</category><author>Mark Rogge, CEO</author></item><item><title>Anthropic Just Proved Our Point: Polite AI Was Never the Same as Secure AI</title><link>https://enforceauth.com/blog/polite-ai-was-never-secure-ai/</link><guid isPermaLink="true">https://enforceauth.com/blog/polite-ai-was-never-secure-ai/</guid><description>Anthropic dropped a core safety commitment. For enterprise security leaders, the takeaway isn’t about one lab’s policy — it’s about the Authorization Gap widening in real time.</description><pubDate>Wed, 25 Feb 2026 00:00:00 GMT</pubDate><category>AI Security</category><author>Mark Rogge, CEO</author></item><item><title>Your AI Agents Are Already Inside the Building. Who’s Watching What They Do?</title><link>https://enforceauth.com/blog/ai-agents-already-inside-the-building/</link><guid isPermaLink="true">https://enforceauth.com/blog/ai-agents-already-inside-the-building/</guid><description>OpenClaw isn&apos;t the problem. It&apos;s the proof. With 180,000+ GitHub stars and shadow deployments in 23% of enterprise environments, autonomous AI agents have outpaced every security architecture designed to govern them.</description><pubDate>Wed, 18 Feb 2026 00:00:00 GMT</pubDate><category>AI Security</category><author>Mark Rogge, CEO</author></item><item><title>You Authenticated Your Machine Identities. You Forgot to Authorize Them.</title><link>https://enforceauth.com/blog/authenticated-machine-identities-forgot-to-authorize/</link><guid isPermaLink="true">https://enforceauth.com/blog/authenticated-machine-identities-forgot-to-authorize/</guid><description>Most organizations treating NHI security as a secrets management problem are solving the wrong half. The real risk isn&apos;t whether machine identities can authenticate — it&apos;s what they&apos;re authorized to do once they&apos;re in.</description><pubDate>Tue, 17 Feb 2026 00:00:00 GMT</pubDate><category>Identity Security</category><author>EnforceAuth, Inc.</author></item><item><title>Closing the Authorization Gap: How EnforceAuth Solves the Security Crisis in Autonomous AI Agents</title><link>https://enforceauth.com/blog/openclaw-authorization-gap-ai-agent-security/</link><guid isPermaLink="true">https://enforceauth.com/blog/openclaw-authorization-gap-ai-agent-security/</guid><description>OpenClaw amassed 150,000+ GitHub stars in two weeks — and exposed 42,665 vulnerable instances, 341 malicious skills, and a critical RCE. A comprehensive technical analysis of the agentic AI security crisis and the decision-centric architecture required to govern it.</description><pubDate>Tue, 10 Feb 2026 00:00:00 GMT</pubDate><category>AI Security</category><author>EnforceAuth, Inc.</author></item><item><title>A $740 Million Bet on Authorization Just Changed the Game for Every Enterprise Deploying AI</title><link>https://enforceauth.com/blog/crowdstrike-sdnl-acquisition-authorization-era/</link><guid isPermaLink="true">https://enforceauth.com/blog/crowdstrike-sdnl-acquisition-authorization-era/</guid><description>CrowdStrike&apos;s $740M acquisition of SDNL validates authorization as a standalone category. But it also exposes a critical gap: the difference between identity-centric and decision-centric authorization, and why enterprises deploying AI agents need both.</description><pubDate>Thu, 08 Jan 2026 00:00:00 GMT</pubDate><category>Industry Analysis</category><author>Mark Rogge, CEO</author></item><item><title>The AUTHOR Framework: Securing the Agentic Enterprise, One Action at a Time</title><link>https://enforceauth.com/blog/the-author-framework-securing-the-agentic-enterprise/</link><guid isPermaLink="true">https://enforceauth.com/blog/the-author-framework-securing-the-agentic-enterprise/</guid><description>A unified reference architecture for runtime authorization in autonomous AI systems. AUTHOR composes Gartner&apos;s TRiSM, Forrester&apos;s AEGIS, CSA&apos;s AARM and AICM, NIST AI RMF, ISO/IEC 42001, the EU AI Act, and DORA around a single architectural truth: the action plane is load-bearing.</description><pubDate>Sun, 04 Jan 2026 12:00:00 GMT</pubDate><category>Whitepaper</category><author>Mark Rogge, Founder &amp; CEO</author></item></channel></rss>