Why I Joined Token Security: Tackling the AI & Identity Crisis No One Sees Coming

What is happening today in cybersecurity truly matters. The pace of technology is always accelerating but there are few moments that seem as impactful as what we’re experiencing right now.
When I joined Token Security as VP of Marketing in April, it wasn’t just about finding the next career opportunity. I was looking for a company solving a real, unsolved problem that’s foundational to how modern infrastructure operates - AND one that will ensure security in the “Age of AI”.
What I’ve found at Token isn’t even just another AI security company. It’s a team with a specific perspective and is on the front lines of a new kind of identity crisis: Non-Human Identities (NHIs). NHIs are an enormous challenge in all environments, from on-premises to the cloud, but with Agentic AI accelerating at a pace that is as terrifying as it is exciting, the NHI Security market is set to explode. Every AI agent has an identity and every identity is an opportunity for the bad guys to log in.
A Shift Few Are Ready For
In today’s enterprise environments, the most hidden, privileged, and least understood users aren’t people. Every service account, API key, automation workflow, ephemeral container, or AI agent is an NHI, and they now outnumber humans by orders of magnitude (45:1 is frequently cited, and one that’s likely to be outdated very shortly).
These NHIs operate at machine speed, often without visibility, ownership, or governance. They’re embedded in your code, hidden in your CI/CD pipelines, running across cloud and SaaS environments. And they represent an ideal entry point for attackers. And yet, most organizations are still trying to manage them with tools built for human identities. That is not a minor disconnect; it’s one that’s about to be readily apparent to companies globally.
Why This Problem Matters Now
In two letters: AI. Agentic AI introduces new, dynamic identities that perform actions autonomously. Meanwhile, legacy secrets are left unrotated. Orphaned credentials persist for years. IAM platforms flag human users, while machine identities remain invisible.
And the breaches reflect this. Attackers are no longer starting with phishing emails. They’re targeting cloud service roles, exposed tokens in GitHub, or misconfigured OAuth apps in SaaS environments.
We’re seeing a threat landscape where the attack paths are machine-native, but the defenses are still human-first.
Why Token Security Is Built to Win
Token doesn’t approach this problem with yet another tool to scan for secrets or rotate keys. We’re pioneering what we call Context-Driven NHI Security — and it’s the only approach that will succeed in the face of ever-increasing complexity.
Rather than focus on a single layer of the problem, Token maps who created a non-human identity, who owns it, how it’s used, what permissions it has, and how it behaves over time. We link NHIs to their Infrastructure-as-Code origins. We trace their usage across cloud, SaaS, CI/CD, and even AI workflows. We detect drift, risk, and anomalies and deliver that insight to the people who can act on it.
This approach isn’t just smarter. It’s scalable, proactive, and ready for the complexity of modern environments.
Token is the only platform that offers continuous visibility, governance, and response across every NHI in every part of your environment.
And we do it without getting in your way.
Why I’m Here
I’ve worked in cybersecurity long enough to know that most big marketing narratives are built after the fact. But Token’s clarity of purpose was here on day one: in the product, the team, and the customer conversations.
From the moment I spoke with our Co-Founders, Itamar and Ido, I saw a market-defining company taking shape.
Token’s platform is:
- AI-native, embracing the future of agentic systems
- Machine-first, built for scale and complexity
- Contextual, not just scanning, but understanding
- Actionable, not just alerting, but enabling remediation at the source
That’s the kind of vision you want to rally around. That’s the kind of company you want to help grow.
Let’s Talk
The NHI problem isn’t going away. But with the right strategy, securely accelerating the use of AI is a competitive advantage. If your security team is struggling with visibility into and control of machine identities, I’d love to connect.