Skip to content

Akeyless unveiled the world’s first Unified Secrets and Machine Identity Platform to address the #1 cause of breaches. Discover Why & How.

The Rise of Machine Identities: Admiral Mike Rogers Discusses the Next Cybersecurity Frontier

In this engaging fireside chat, Oded Hareven, CEO and Co-founder of Akeyless, sits down with Admiral Mike Rogers, former Director of the NSA and Commander of U.S. Cyber Command, to discuss the evolving landscape of cybersecurity. Their conversation dives into pressing topics such as the rise of machine identities, the challenges of scaling cybersecurity in an increasingly complex environment, and the innovative approaches needed to tackle these issues. With insights from both the public and private sectors, this discussion provides a comprehensive look at the strategies and technologies shaping the future of digital security.


From Leadership to Cybersecurity: Meet Admiral Mike Rogers

With 37 years of service in the U.S. Navy and leadership roles as NSA Director and Commander of U.S. Cyber Command, Admiral Mike Rogers has unparalleled insights into the cybersecurity landscape. Leading two of the largest cyber organizations in the world, he tackled missions to:

  • Identify and understand cyber actors.
  • Develop and manage encryption for classified systems.
  • Defend and penetrate networks.
  • Support critical infrastructure in collaboration with the private sector.

Reflecting on his career, Rogers emphasized that people, not just technology, are the key to cybersecurity success. “Leadership is so important. This is about identifying, training, recruiting, retaining, and motivating humans,” he explained.

The Complexity of Cybersecurity Tools

Rogers highlighted the need for integrated solutions, sharing his experience with vendors during his tenure:

“I cannot keep proliferating more apps, systems, and software for our cybersecurity workforce. I need speed, scale, and simplicity.”

Hareven agreed, pointing out the exponential growth in cybersecurity tools—over 5,000 vendors today. “If someone counted startups, they’d probably find even more,” he remarked.

The proliferation of tools complicates defense strategies, leading to inefficiencies and increased attack surfaces.

The Rise of Machine Identities

As machine identities outnumber human identities by 45x, the cybersecurity landscape grows increasingly complex.

Hareven cited recent data:

  • A 240% rise in digital identities in 2023.
  • Enterprises with 10,000 employees managing nearly half a million machines.

Rogers noted that attackers exploit static machine identities, making secrets like passwords, credentials, and certificates prime targets. “If we get trust in identity wrong, we’re in trouble,” he warned.

Innovative Solutions: Akeyless’s Approach

Hareven explained how Akeyless addresses these challenges through its Distributed Fragments Cryptography (DFC) technology:

  • Vaultless Design: Encryption keys never exist as a whole, even during use, preventing attackers from decrypting stolen data.
  • Dynamic Secrets: Just-in-Time (JIT) credentials create temporary identities for machines, which are deleted after use, enhancing compliance and auditability.
  • Secretless Architecture: Protocols like OIDC, SPIFFE, and SPIRE enable machine authentication without physical secrets, reducing targets for attackers.

“Our goal is to transition to a secretless world, minimizing secrets and complexity,” Hareven stated.

Unifying Cybersecurity

Akeyless unifies key cybersecurity functions, eliminating the need for multiple tools and vendors:

  • Secrets management.
  • Encryption and key management.
  • Certificate lifecycle management.
  • Secure remote access.
  • Password management.

This integrated approach simplifies operations, reduces complexity, and enhances security posture for enterprises.

Advice for Today’s CISOs

To conclude, Rogers shared actionable advice for cybersecurity leaders:

  1. Baseline Your Configuration: Understand what you’re defending.
  2. Reduce Complexity: Simplify operations wherever possible.
  3. Invest in People: Well-trained, motivated professionals make the difference.

Closing Thoughts

Admiral Rogers’s insights and Akeyless’s innovative approach highlight the critical need to rethink cybersecurity. As the number of machine identities continues to grow, integrated solutions and dynamic secrets are key to staying ahead of adversaries.

“We’ve got to approach this in a much more integrated way,” Rogers concluded. “The stovepipe solutions we’ve used historically just aren’t scalable.”

Akeyless is leading the charge, providing a unified platform that simplifies cybersecurity for a safer, more efficient future.


This conversation underscores the urgent need for unified solutions to manage secrets and machine identities at scale. Akeyless’s innovative platform simplifies complexity, enhances security, and provides the tools organizations need to stay ahead of evolving threats. Ready to see how Akeyless can help your organization secure its digital landscape? Schedule a personalized demo today and discover the power of unified secrets and machine identity management.

About Akeyless

Trusted by Fortune 100 companies and industry leaders, Akeyless is redefining identity security for the modern enterprise, delivering the world’s first unified Secrets & Machine Identity platform designed to prevent the #1 cause of breaches – compromised identities and secrets. Backed by the world’s leading cybersecurity investors and global financial institutions including JVP, Team8, NGP Capital and Deutsche Bank, Akeyless Security delivers a cloud-native SaaS platform that integrates Vaultless® Secrets Management with Certificate Lifecycle Management, Next Gen Privileged Access Management (Secure Remote Access), Encryption and Key Management Services (KMS) to manage the lifecycle of all non-human identities and secrets across all environments.

Ready to get started?

Discover how Akeyless simplifies secrets management, reduces sprawl, minimizes risk, and saves time.

Book a Demo