Most identity security tools focus on human identities or non-human identities. Attackers don't make that choice.
A real attack chain: social engineering call gets a password reset. That access authorizes a new OAuth app. The OAuth app pivots to a service account with broader permissions.
Three identity types. One attack. Most tools see fragments.
Auth Sentry monitors both in a single graph: gethumming.io/how-it-works
#IdentitySecurity #ITDR #CyberSecurity #NHI
