< ciso
brief />
Tag Banner

All news with #agent security tag

148 articles · page 7 of 8

Autonomous AI Hacking: How Agents Will Reshape Cybersecurity

⚠️ AI agents are increasingly automating cyberattacks, performing reconnaissance, exploitation, and data theft at machine speed and scale. In 2023 examples include XBOW's mass vulnerability reports, DARPA teams finding dozens of flaws in hours, and reports of adversaries using Claude and HexStrike-AI to orchestrate ransomware and persistent intrusions. This shift threatens accelerated attacks beyond traditional patch cycles while presenting new defensive opportunities such as AI-assisted vulnerability discovery, VulnOps, and even self-healing networks.
read more →

Startup Technical Guide: Building Production AI Agents

🤖 Google Cloud published the Startup technical guide: AI agents, a practical, operations-driven roadmap to design, build, and operate agentic systems for startups. The guide outlines three paths — build with the open-source Agent Development Kit (ADK), design no-code agents in Agentspace, or adopt managed and partner agents via Vertex AI and the Agent Garden marketplace. It details four development steps (identity, prime directive, tools, lifecycle), highlights operational rigor (AgentOps), and promotes interoperability through standards such as MCP and A2A, all aimed at safe production deployment.
read more →

Google launches CodeMender, AI VRP and SAIF 2.0 to defend

🔒 Google announced a set of AI security measures: the AI-powered agent CodeMender, a dedicated AI Vulnerability Reward Program (AI VRP), and Secure AI Framework 2.0 (SAIF 2.0). CodeMender leverages advanced reasoning to find, self-validate, and propose patches at scale. SAIF 2.0 introduces an agent risk map and secure-by-design controls, while the AI VRP centralizes reporting and incentives to accelerate remediation.
read more →

Databricks Launches AI-Driven Cybersecurity Lakehouse

🔒 Databricks has introduced Data Intelligence for Cybersecurity, an AI-driven platform that unifies fragmented security telemetry on its Lakehouse architecture to provide real-time, context-rich threat detection. The offering includes Agent Bricks to build governed AI agents, conversational dashboards, and natural-language queries for nontechnical stakeholders. Early adopters such as Arctic Wolf, Palo Alto Networks, and SAP report sharper detection, lower costs, and faster operations, while Databricks expands integrations across a broad partner ecosystem to challenge established SIEM and analytics vendors.
read more →

Agentic AI in IT Security: Expectations vs Reality

🛡️ Agentic AI is moving from lab experiments into real-world SOC deployments, where autonomous agents triage alerts, correlate signals across tools, enrich context, and in some cases enact first-line containment. Early adopters report fewer mundane tasks for analysts, faster initial response, and reduced alert fatigue, while noting limits around noisy data, false positives, and opaque reasoning. Most teams begin with bolt-on integrations into existing SIEM/SOAR pipelines to minimize disruption, treating standalone orchestration as a second-phase maturity step.
read more →

Okta Launches Identity Security Fabric for AI Agents

🔒 Okta introduced an Identity Security Fabric to secure AI agents and unify identity, application, and agent management across enterprises. The platform combines AI agent lifecycle management, a Cross App Access protocol, and Verifiable Digital Credentials (VDC) to enforce least privilege, discover and monitor agents, and replace fragmented point solutions. Early access features begin in fiscal 2027.
read more →

OpenAI Is Testing GPT-Alpha, a GPT-5-Based AI Agent

🧪 OpenAI is internally testing a new AI agent, GPT-Alpha, built on a special GPT-5 variant and briefly exposed to users in an accidental push. A screenshot shared on X showed an 'Agent with Truncation' listing under Alpha Models, and the agent's system prompt outlines capabilities to browse the web, generate and edit images, write, run, and debug code, and create or edit documents, spreadsheets, and slides. OpenAI says the agent uses GPT-5 for advanced reasoning and tool use and may initially be offered as a paid feature due to increased compute demands.
read more →

Agent Factory: Building the Open Agentic Web Stack

🔧This wrap-up of the Agent Factory series lays out a repeatable blueprint for designing and deploying enterprise-grade AI agents and introduces the agentic web stack. It catalogs eight essential components—communication protocols, discovery, identity and trust, tool invocation, orchestration, telemetry, memory, and governance—and positions Azure AI Foundry as an implementation. The post stresses open standards such as MCP and A2A, emphasizes interoperability across organizations, and highlights observability and governance as core operational requirements.
read more →

Amazon Nova Act IDE Extension for Agent Development and Testing

🤖 Amazon Web Services announced the Nova Act extension, embedding the agent development workflow directly into popular IDEs such as Visual Studio Code, Kiro, and Cursor. The extension unifies natural-language script creation, fine-grained scripting controls, and integrated browser testing into a single interface, reducing context switching across tools. Built on the Nova Act SDK (research preview since March 2025), the extension is available today from IDE extension marketplaces and the project’s GitHub repository includes documentation and examples to get started.
read more →

Agentic AI Risks and Governance: A Major CISO Challenge

⚠️ Agentic AI is proliferating inside enterprises, embedding autonomous agents into development, customer support, process automation, and employee workflows. Security experts warn these systems create substantial visibility and governance gaps: organizations often do not know where agents run, what data they access, or how independent their actions are. Key risks include risky autonomy, uncontrolled data sharing among agents, third-party integration vulnerabilities, and the potential for agents to enable or mimic multi-stage attacks. CISOs should prioritize real-time observability, strict governance, secure-by-design development, and cross-functional coordination to mitigate these threats.
read more →

Gemini CLI Deep Dive: Origins, Design, and Roadmap

🚀 The Gemini CLI is an open-source, agentic command-line assistant built to reason, select tools, and execute multi-step developer workflows while keeping users informed. In a recent Agent Factory episode, creator Taylor Mullen discussed the project's origin, design philosophy, and roadmap. Demonstrations showed onboarding to codebases, converting research papers into interactive explainers, and creating reusable slash commands. The team emphasizes extensibility, transparency, and community-driven contributions.
read more →

Achieve Agentic Productivity with Vertex AI Agent Builder

🛠️ Vertex AI Agent Builder is a unified platform for building, grounding, and deploying production-grade AI agents, designed to move organizations from prototype to scalable, secure services. It centers development on five pillars: Agent frameworks, Model choice, Tools for taking actions, Scalability and performance, and Built-in trust and security, and supports the Agent Development Kit (ADK) and third-party models including Gemini 2.5 Flash Pro. The platform offers managed runtime features such as sandboxed code execution, Agent-to-Agent collaboration, Bidirectional Streaming, and a streamlined one-line path from ADK prototype to Agent Engine deployment, while enterprise controls like VPC-SC and CMEK address compliance and data protection.
read more →

Mind the Gap: TOCTOU Vulnerabilities in LLM-Enabled Agents

⚠️A new study, “Mind the Gap,” examines time-of-check to time-of-use (TOCTOU) flaws in LLM-enabled agents and introduces TOCTOU-Bench, a 66-task benchmark. The authors demonstrate practical attacks such as malicious configuration swaps and payload injection and evaluate defenses adapted from systems security. Their mitigations—prompt rewriting, state integrity monitoring, and tool-fusing—achieve up to 25% automated detection and materially reduce the attack window and executed vulnerabilities.
read more →

Securing AI: End-to-End Protection with Prisma AIRS

🔒Prisma AIRS offers unified, AI-native security across the full AI lifecycle, from model development and training to deployment and runtime monitoring. The platform focuses on five core capabilities—model scanning, posture management, AI red teaming, runtime security and agent protection—to detect and mitigate threats such as prompt injection, data poisoning and tool misuse. By consolidating workflows and sharing intelligence across Prisma, it aims to simplify operations, accelerate remediation and reduce total cost of ownership so organizations can deploy bravely.
read more →

CrowdStrike Unveils Agentic AI Platforms After Onum Deal

🤖 CrowdStrike is expanding its agentic AI strategy following its $290 million acquisition of Onum, introducing two initiatives designed to accelerate real-time telemetry and automate SOC workflows. The Agentic Security Platform builds an "enterprise graph" with a semantic data model that acts as a Rosetta Stone to normalize diverse telemetry and enable a global query and command engine. Agent Works provides a no-code environment to create, test, and deploy agentic systems, while the Agentic Security Workforce delivers mission-ready agents in Falcon sensors to automate repetitive analyst tasks and enforce data-protection controls across endpoints.
read more →

Securing the Agentic Era: Astrix's Agent Control Plane

🔒 Astrix introduces the industry's first Agent Control Plane (ACP) to enable secure-by-design deployment of autonomous AI agents across the enterprise. ACP issues short-lived, precisely scoped credentials and enforces just-in-time, least-privilege access while centralizing inventory and activity trails. The platform streamlines policy-driven approvals for developers, speeds audits for security teams, and reduces compliance and operational risk by discovering non-human identities (NHIs) and remediating excessive privileges in real time.
read more →

Google Cloud and SAP: Unified Data, AI Agents, and HANA

🚀 Google Cloud and SAP announced tighter integration to unify enterprise data and accelerate intelligent automation. SAP Business Data Cloud now connects to BigQuery via Datasphere, enabling bidirectional replication and AI-ready analytics. Procurement is simplified on the Google Cloud Marketplace with SAP BTP. New agent tooling—Agentspace, the Agent Development Kit, A2A and MCP standards—and expanded M4 memory-optimized VMs certified for SAP HANA aim to speed deployments, improve data consistency, and enable autonomous process automation.
read more →

CrowdStrike Falcon: Building an Agentic Security Platform

🚀 The CrowdStrike Falcon fall release reframes the platform as an Agentic Security Platform, introducing four core innovations: Enterprise Graph, Charlotte AI AgentWorks, the Agent Collaboration framework (powered by MCP), and an AI-native console. Enterprise Graph unifies telemetry into a real-time, AI-ready data layer to give humans and agents shared context. Charlotte AI AgentWorks delivers a no-code environment to design, test, deploy, and govern mission-specific security agents at scale, while MCP enables secure, orchestrated multi-agent collaboration.
read more →

Agent Integration with Open Standards: MCP and A2A

🔗 Azure's Agent Factory blog emphasizes that interoperability is the key to moving agentic AI from isolated prototypes to enterprise-scale solutions. The post promotes open standards like Model Context Protocol (MCP) and Agent2Agent (A2A) to enable shared context, reusable tools, and cross-framework collaboration across runtimes such as Semantic Kernel. It explains how Azure AI Foundry combines these protocols with thousands of connectors, unified observability, and governance so agents can act across SaaS, legacy systems, and custom APIs without costly rewrites.
read more →

Shadow AI Agents Multiply Rapidly — Detection and Control

⚠️ Shadow AI Agents are proliferating inside enterprises as developers, business units, and cloud platforms spin up non-human identities and automated workflows without security oversight. These agents can impersonate trusted users, exfiltrate data across boundaries, and generate invisible attack surfaces tied to unknown NHIs. The webinar panel delivers a pragmatic playbook for detecting, governing, and remediating rogue agents while preserving innovation.
read more →