BankInfoSecurity.com
1Password Focuses on Identity Security in Agentic AI Era
17 hours 34 minutes ago
Former AWS Exec Nancy Wang to Lead 1Password's Agentic AI Security Strategy
1Password named former AWS executive Nancy Wang as chief technology officer to oversee the evolution of its platforms to manage new artificial intelligence-driven workflows. "Agents are really their own class of identities," Wang said.
1Password named former AWS executive Nancy Wang as chief technology officer to oversee the evolution of its platforms to manage new artificial intelligence-driven workflows. "Agents are really their own class of identities," Wang said.
NIST Calls for Public to Help Better Secure AI Agents
17 hours 34 minutes ago
NIST Seeks Input to Protect AI Systems Used in Government, Critical Infrastructure
The National Institute of Standards and Technology is seeking public input from security experts and stakeholders to weigh in on security threats from agentic AI warning they may be vulnerable to exploits like hijacking, backdoors and misaligned behavior across federal networks.
The National Institute of Standards and Technology is seeking public input from security experts and stakeholders to weigh in on security threats from agentic AI warning they may be vulnerable to exploits like hijacking, backdoors and misaligned behavior across federal networks.
SAP Defense in Focus as Zerlang Takes Over at SecurityBridge
17 hours 34 minutes ago
New CEO Jesper Zerlang Plans Global Growth, US Push and Vertical Expansion
Former Logpoint chief Jesper Zerlang, now CEO at SecurityBridge, says SAP security remains a weak link in enterprise risk strategies. As CEO of SecurityBridge, he’s launching a global expansion and leaning into the company's product differentiators to fill the gap.
Former Logpoint chief Jesper Zerlang, now CEO at SecurityBridge, says SAP security remains a weak link in enterprise risk strategies. As CEO of SecurityBridge, he’s launching a global expansion and leaning into the company's product differentiators to fill the gap.
Inside the Growing Problem of Identity Sprawl
17 hours 34 minutes ago
Why Identity Life Cycles, Visibility and Privilege Are Falling Out of Sync
Modern enterprises are struggling to maintain control over identity management. While authentication still works, a systemic drift in how identities are created and discarded is creating an expanded attack surface that adversaries are increasingly exploiting.
Modern enterprises are struggling to maintain control over identity management. While authentication still works, a systemic drift in how identities are created and discarded is creating an expanded attack surface that adversaries are increasingly exploiting.
Key Areas of Convergence for IT-OT Security in Energy Sector
3 days 18 hours ago
Hitachi Energy Security Head Joe Doetzl on Common Tools and Practices
While IT and OT environments were traditionally seen as two separate parts of the organization, security teams can use common tools and practices to protect both areas, said Joe Doetzl, head of cybersecurity at Hitachi Energy. The company designated a single leader for IT-OT environments years ago.
While IT and OT environments were traditionally seen as two separate parts of the organization, security teams can use common tools and practices to protect both areas, said Joe Doetzl, head of cybersecurity at Hitachi Energy. The company designated a single leader for IT-OT environments years ago.
Illinois Notifies 700,000 of Misconfiguration Breach
3 days 18 hours ago
Mapping Platform Exposed Addresses and Medical Assistance Plans
The Illinois Department of Human Services is notifying more than 700,000 people of a breach involving "incorrect privacy settings" left in place for several years that exposed online data pertaining to Medicare, Medicaid and rehabilitation services recipients.
The Illinois Department of Human Services is notifying more than 700,000 people of a breach involving "incorrect privacy settings" left in place for several years that exposed online data pertaining to Medicare, Medicaid and rehabilitation services recipients.
CrowdStrike Adds Real-Time Identity Control With SGNL Deal
3 days 18 hours ago
$740M SGNL Acquisition Boosts Dynamic Identity Enforcement for Humans and AI Agents
With the $740M acquisition of SGNL, CrowdStrike aims to deliver dynamic access control for human and nonhuman identities. The real-time enforcement layer expands CrowdStrike's identity capabilities amid a market shift toward zero standing privilege and agentic workforce security.
With the $740M acquisition of SGNL, CrowdStrike aims to deliver dynamic access control for human and nonhuman identities. The real-time enforcement layer expands CrowdStrike's identity capabilities amid a market shift toward zero standing privilege and agentic workforce security.
ISMG Editors: Lack of MFA Keeps Fueling Cloud Data Breaches
3 days 18 hours ago
Also: Turning AI Data Into AI Defense, Autonomous Border Patrol Robots
In this week's panel, ISMG editors discussed how basic security failures are still opening the door to major breaches, how researchers are rethinking data protection in the age of artificial intelligence and the implications of robots with AI patrolling national borders.
In this week's panel, ISMG editors discussed how basic security failures are still opening the door to major breaches, how researchers are rethinking data protection in the age of artificial intelligence and the implications of robots with AI patrolling national borders.
Detect and Respond Faster with Elastic & Tines
4 days 6 hours ago
Security operations center (SOC) teams are under nonstop pressure. Threats are rising, attack techniques are evolving, and analysts are drowning in alerts. Meanwhile, SOC leaders are asked to do more with fewer resources and tighter budgets.
Breach Roundup: Firewalls Headed for Obsolescence
4 days 6 hours ago
Also, Sedgwick Confirms Breach, Romanian Power Firm Hit, D-Link Flaws Exploited
This week, Moody's said firewalls will be obsolete, Romanian critical infrastructure hacked, Sedgwick breach and a D-Link DSL flaw. Finland seized the Fitburg. Microsoft said Direct Send not to blame for Exchange phishing. Malicious Chrome extensions, European hotels targeted and health breaches.
This week, Moody's said firewalls will be obsolete, Romanian critical infrastructure hacked, Sedgwick breach and a D-Link DSL flaw. Finland seized the Fitburg. Microsoft said Direct Send not to blame for Exchange phishing. Malicious Chrome extensions, European hotels targeted and health breaches.
Webinar | Securing AI and Cloud in OT: Why IT/OT Convergence Is Mission-Critical for Smart Manufacturing
4 days 19 hours ago
Breach Roundup: Firewalls Headed for Obsolesce
4 days 19 hours ago
Also, Sedgwick Confirms Breach, Romanian Power Firm Hit, D-Link Flaws Exploited
This week, Moody's said firewalls will be obsolete, Romanian critical infrastructure hacked, Sedgwick breach and a D-Link DSL flaw. Finland seized the Fitburg. Microsoft said Direct Send not to blame for Exchange phishing. Malicious Chrome extensions, European hotels targeted and health breaches.
This week, Moody's said firewalls will be obsolete, Romanian critical infrastructure hacked, Sedgwick breach and a D-Link DSL flaw. Finland seized the Fitburg. Microsoft said Direct Send not to blame for Exchange phishing. Malicious Chrome extensions, European hotels targeted and health breaches.
ChatGPT Health: Top Privacy, Security, Governance Concerns
4 days 19 hours ago
OpenAI: Tool Will 'Securely' Connect With Medical Records, But How Will That Work?
OpenAI is rolling out a new version of ChatGPT dedicated to health that the company said will also "securely" connect users' medical records and wellness apps to better personalize responses. OpenAI says more than 230 million people each week ask ChatGPT wellness and health related questions.
OpenAI is rolling out a new version of ChatGPT dedicated to health that the company said will also "securely" connect users' medical records and wellness apps to better personalize responses. OpenAI says more than 230 million people each week ask ChatGPT wellness and health related questions.
Cyber Retaliation Risks Rise After US-Venezuela Operation
4 days 19 hours ago
CISA Warns of Retaliatory Cyber Action From Hostile State Actors After Venezuela
Federal cybersecurity officials are warning of a likely uptick in retaliatory cyber activity from China and Russia-linked threat actors after the U.S. military raid in Venezuela, urging infrastructure operators to brace for disruptive probing and attacks.
Federal cybersecurity officials are warning of a likely uptick in retaliatory cyber activity from China and Russia-linked threat actors after the U.S. military raid in Venezuela, urging infrastructure operators to brace for disruptive probing and attacks.
Cyera Secures $400M Series F to Lead in Agentic AI Security
4 days 19 hours ago
Blackstone-Led Funding Round Expands R&D and Partnerships to Address AI Threats
With AI adoption outpacing security readiness, Cyera secured $400 million at a $9 billion valuation to protect data in an agentic AI landscape. The company plans to expand engineering efforts and partner with tech giants to create a control plane for enterprise AI use.
With AI adoption outpacing security readiness, Cyera secured $400 million at a $9 billion valuation to protect data in an agentic AI landscape. The company plans to expand engineering efforts and partner with tech giants to create a control plane for enterprise AI use.
Zero Trust for the Age of Autonomous AI Agents - Part 1
5 days 10 hours ago
Why Human-Centric Zero Trust Models Fail in a World of Autonomous AI Agents
Zero trust was built for humans, not autonomous AI agents. As organizations adopt agentic AI at scale, human-centric security assumptions break down - creating a paradox between utility and least privilege that traditional zero trust models cannot resolve.
Zero trust was built for humans, not autonomous AI agents. As organizations adopt agentic AI at scale, human-centric security assumptions break down - creating a paradox between utility and least privilege that traditional zero trust models cannot resolve.
Deception Tech Snares Shiny Hunter Attacker's IP Address
5 days 10 hours ago
Targeted Threat Intel Firm Shares Details With Police After Honeypot Hit
Getting owned by deception technology isn't good news for one's criminal brand or ability to remain at large. Just ask the band of young hackers behind "Scattered Lapsus$ Shiny Hunters," when one of their ilk fell into a security firm's honeytrap, revealing his actual IP address in the process.
Getting owned by deception technology isn't good news for one's criminal brand or ability to remain at large. Just ask the band of young hackers behind "Scattered Lapsus$ Shiny Hunters," when one of their ilk fell into a security firm's honeytrap, revealing his actual IP address in the process.
Cyber Flatlines in FY 2026 Justice, Commerce Spending Bill
5 days 10 hours ago
Congress Holds Cyber Funding at 2024 Levels Across Key Civilian Agencies
The fiscal year 2026 budget deal largely locks in federal cybersecurity funding at 2024 levels, stalling growth across key civilian agencies even as lawmakers call for global technology leadership as the U.S. government faces mounting nation-state cyber threats.
The fiscal year 2026 budget deal largely locks in federal cybersecurity funding at 2024 levels, stalling growth across key civilian agencies even as lawmakers call for global technology leadership as the U.S. government faces mounting nation-state cyber threats.
Orca, Wiz End Dueling Lawsuits Over Cloud Security Patents
5 days 10 hours ago
Patent Board Decision Invalidating 3 Orca Patents Weakens Case, Leads to Dismissal
After 30 months of legal sparring, Wiz and Orca Security have agreed to dismiss all claims in their cloud security patent dispute. The end of the case comes after a significant setback for Orca: A federal board invalidated three of its asserted patents.
After 30 months of legal sparring, Wiz and Orca Security have agreed to dismiss all claims in their cloud security patent dispute. The end of the case comes after a significant setback for Orca: A federal board invalidated three of its asserted patents.
Checked
6 hours 36 minutes ago
BankInfoSecurity.com RSS News Feeds on bank information security news, regulations, blogs and education
BankInfoSecurity.com feed