{"id":210874,"date":"2025-05-28T04:01:00","date_gmt":"2025-05-28T04:03:12","guid":{"rendered":"https:\/\/www.cyberark.com\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/"},"modified":"2026-05-22T14:19:12","modified_gmt":"2026-05-22T18:19:12","slug":"ep-8-zero-trust-zero-chill-securing-machine-identity","status":"publish","type":"podcast","link":"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/","title":{"rendered":"EP 8 &#8211; Zero Trust, Zero Chill: Securing Machine Identity"},"content":{"rendered":"<p>In this episode of Security Matters, host David Puner welcomes Kevin Bocek, CyberArk SVP of Innovation, for an insightful discussion on the critical role of machine identity in modern cybersecurity. As digital environments become increasingly complex, securing machine identities has never been more crucial.<\/p>\n<p>According to the CyberArk <a href=\"https:\/\/www.cyberark.com\/threat-landscape\/\">2025 Identity Security Landscape<\/a>, machine identities now outnumber human identities by more than 80 to 1. As organizations scale cloud workloads and automation, these identities are becoming a critical part of the cybersecurity frontline. From TLS certificate outages to API key exposures, failures in machine identity management can lead to outages, breaches, and cascading system failures. In this episode of Security Matters, Kevin Bocek explains why this moment is pivotal for getting machine identity right\u2014and how Zero Trust principles, automation, and visibility are essential to building cyber resilience.<\/p>\n<p>We also explore the future of identity security\u2014from AI kill switches and agentic AI to quantum threats\u2014and how identity can serve as both a safeguard and a kill switch in the age of autonomous systems.<\/p>\n<p>Whether you&#8217;re a cybersecurity professional or simply interested in the latest security trends, this episode offers valuable insights into the importance of machine identity in safeguarding our digital world. Don\u2019t forget to subscribe, leave a review, and follow Security Matters for more expert discussions on the latest in cybersecurity.<\/p>\n","protected":false},"featured_media":213774,"template":"","class_list":["post-210874","podcast","type-podcast","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>EP 8 - Zero Trust, Zero Chill: Securing Machine Identity | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EP 8 - Zero Trust, Zero Chill: Securing Machine Identity\" \/>\n<meta property=\"og:description\" content=\"In this episode of Security Matters, host David Puner welcomes Kevin Bocek, CyberArk SVP of Innovation, for an insightful discussion on the critical role of machine identity in modern cybersecurity. As digital environments become increasingly complex, securing...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-22T18:19:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/05\/MGMwZS5qcGc-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"1400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/\",\"url\":\"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/\",\"name\":\"EP 8 - Zero Trust, Zero Chill: Securing Machine Identity | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/ja\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/05\/MGMwZS5qcGc-1.jpg\",\"datePublished\":\"2025-05-28T04:03:12+00:00\",\"dateModified\":\"2026-05-22T18:19:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/05\/MGMwZS5qcGc-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/05\/MGMwZS5qcGc-1.jpg\",\"width\":1400,\"height\":1400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/ja\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EP 8 &#8211; Zero Trust, Zero Chill: Securing Machine Identity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/ja\/#website\",\"url\":\"https:\/\/www.cyberark.com\/ja\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/ja\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/ja\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/ja\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/ja\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.cyberark.com\/ja\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/ja\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"EP 8 - Zero Trust, Zero Chill: Securing Machine Identity | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/","og_locale":"ja_JP","og_type":"article","og_title":"EP 8 - Zero Trust, Zero Chill: Securing Machine Identity","og_description":"In this episode of Security Matters, host David Puner welcomes Kevin Bocek, CyberArk SVP of Innovation, for an insightful discussion on the critical role of machine identity in modern cybersecurity. As digital environments become increasingly complex, securing...","og_url":"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-05-22T18:19:12+00:00","og_image":[{"width":1400,"height":1400,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/05\/MGMwZS5qcGc-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"1\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/","url":"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/","name":"EP 8 - Zero Trust, Zero Chill: Securing Machine Identity | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/05\/MGMwZS5qcGc-1.jpg","datePublished":"2025-05-28T04:03:12+00:00","dateModified":"2026-05-22T18:19:12+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/05\/MGMwZS5qcGc-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/05\/MGMwZS5qcGc-1.jpg","width":1400,"height":1400},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/ja\/podcasts\/ep-8-zero-trust-zero-chill-securing-machine-identity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/ja\/"},{"@type":"ListItem","position":2,"name":"EP 8 &#8211; Zero Trust, Zero Chill: Securing Machine Identity"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/ja\/#website","url":"https:\/\/www.cyberark.com\/ja\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/ja\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.cyberark.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/podcast\/210874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/podcast"}],"about":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/types\/podcast"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/media\/213774"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/ja\/wp-json\/wp\/v2\/media?parent=210874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}