SecurityBrief US - Technology news for CISOs & cybersecurity decision-makers

Authorisation stories - Page 2

Enterprise security permission sprawl cleanup keys padlocks flat

Opal launches AI tools to tackle unused permissions

Last month
#
data analytics
#
digital transformation
#
pam
Opal Security unveils AI agents and tools to root out unused access rights as research shows permissions sprawl swamping security teams.
Global testing labs network world map digital identity locks

OpenID Foundation unveils new independent testing plan

Last month
#
crypto
#
fintech
#
cybersecurity
OpenID Foundation names four partners to deliver new independent conformance testing for fast-growing digital identity schemes from 2026.
Enterprise it security control room ai agents zero trust gateways

Token Security unveils intent-based AI agent controls

Last month
#
digital transformation
#
cloud security
#
advanced persistent threat protection
Token Security launches intent-based controls to govern AI agents' access by purpose, aiming to curb over-privileged, autonomous system behaviour.
Moody soc night cybersecurity analyst ai threat maps hidden agents

Coalfire launches AI threat hunting for shadow agents

Last month
#
firewalls
#
data protection
#
digital transformation
Coalfire's new DivisionHex service hunts shadow AI and rogue agents as most firms report AI-driven security incidents without proper oversight.
Ai cyber risk weak identity controls server room breached

Firms relax identity controls to speed risky AI rollouts

Last month
#
digital transformation
#
pam
#
it automation
Rushing to embrace AI, most firms are easing identity controls despite visibility gaps around powerful non-human and AI-linked accounts.
Global ai data center network isometric servers world map view

Atlassian scales AI search with OpenSearch on Kubernetes

Last month
#
saas
#
virtualisation
#
dr
Atlassian rebuilt its search on OpenSearch and Kubernetes to power AI-ready, compliant, multi-tenant search for millions of global users.
Modern corporate soc room with source code graphs and risk heatmaps

Secure Code Warrior unveils AI code governance tool

Last month
#
application security
#
devsecops
#
supply chain
Secure Code Warrior launches SCW Trust Agent: AI, giving security teams commit-level visibility and control over AI-influenced code.
Cinematic secure ops center unified access ai devices glowing vault

1Password debuts Unified Access to secure AI agents

Last month
#
data protection
#
cloud security
#
mdm
1Password unveils Unified Access to secure AI agents and machine credentials, promising endpoint-to-agent visibility for security teams.
Peter barker

Verified trust boosts conversions, cuts fraud losses

Last month
#
digital transformation
#
biometrics
#
socs
Verified trust leaders see 51% higher sign-ups, 43% less fraud and faster onboarding as AI-era identity moves from static gate to dynamic fabric.
Soc monitoring unauthorized ai tools secure office environment

SailPoint launches Shadow AI tool to rein in staff use

Last month
#
data protection
#
cloud security
#
mdm
SailPoint debuts Shadow AI Remediation to monitor and block risky staff use of unsanctioned generative AI tools in real time.
Secure cloud fortress identity governance ai humans robots

SailPoint & AWS ally on AI agent identity governance

Last month
#
saas
#
digital transformation
#
hyperscale
SailPoint strikes multi-year AWS deal to govern fast-growing AI agent identities with unified controls across human and machine access.
Story 301609

Okta unveils blueprint to lock down AI agents at work

Last month
#
robots
#
data protection
#
siem
Okta sets out blueprint and tools to corral workplace AI agents, promising tighter discovery, access control and rapid kill switches.
Shiv ramji  president auth0 headshot

Rise of AI Agents introduces new infosec risk: Okta

Last month
#
data protection
#
digital transformation
#
mfa
Okta warns that surging numbers of uncontrolled AI agents pose a major identity and access risk as they become the new digital workforce.
Enterprise datacenter sql server patch technicians security shield

Microsoft patches major SQL Server flaw in March update

Last month
#
firewalls
#
network security
#
mfa
Microsoft's March Patch Tuesday fixes 77 flaws, including a severe SQL Server bug that could grant attackers sysadmin rights remotely.
Envoy open source hub for secure ai microservices extension mesh

Tetrate unveils Built on Envoy open source extension hub

Last month
#
virtualisation
#
firewalls
#
hyperscale
Tetrate launches Built on Envoy, an open source extension hub to speed enterprise adoption of Envoy, especially for AI-heavy workloads.
Hybrid cloud network stolen digital identity glowing key figure

Google report warns identity is weak link in cloud

Last month
#
malware
#
ransomware
#
hybrid cloud
Attackers are ditching malware for stolen identities, misconfigurations and abused AI tools, Google warns in its latest cloud threat report.
Secure enterprise data hub governed ai access transparent shield

RecordPoint unveils MCP Server for governed AI data

Last month
#
physical security
#
ai security
#
risk & compliance
RecordPoint launches an MCP Server to give AI tools secure, auditable access to governed enterprise data via a standardised interface.
Asian engineer cybersecurity breach red warnings cloud repos

Claude Code flaws expose new risks in AI dev tools

Last month
#
devops
#
cloud security
#
application security
Claude Code flaws found by Check Point could let malicious repos run code and grab API keys before developers confirm a project is trusted.
Interlocking metal shields cloud zero trust ai security illustration

Delinea buys StrongDM to tackle AI-driven access risk

Last month
#
devops
#
hybrid cloud
#
pam
Delinea acquires StrongDM to fuse privileged access tools with just‑in‑time authorisation, tackling AI‑driven identity and access risks.
Ai security lock glass office data breach neural network night

AI adoption drives security spend but breaches persist

Last month
#
data protection
#
hybrid cloud
#
digital transformation
Rising AI adoption is driving higher security spend, yet most enterprises still suffer repeated breaches as risk outpaces new defences.