All news with #machine identity tag
Fri, November 14, 2025
Agentic AI Expands Identity Attack Surface Risks for Orgs
🔐 Rubrik Zero Labs warns that the rise of agentic AI has created a widening gap between an expanding identity attack surface and organizations’ ability to recover from compromises. Their report, Identity Crisis: Understanding & Building Resilience Against Identity-Driven Threats, finds 89% of organizations have integrated AI agents and estimates NHIs outnumber humans roughly 82:1. The authors call for comprehensive identity resilience—beyond traditional IAM—emphasizing zero trust, least privilege, and lifecycle control for non-human identities.
Mon, November 3, 2025
Amazon Cognito simplifies Machine-to-Machine pricing
🔔 AWS has simplified pricing for Amazon Cognito machine-to-machine (M2M) authentication by removing the M2M app client price dimension. Customers will now be charged only for successful M2M token requests per month instead of both registered app clients and token requests. The change is effective immediately across all supported Cognito regions and is automatic, requiring no customer action. This reduces the cost to build and scale M2M integrations.
Wed, October 29, 2025
Preparing for the Digital Battlefield of Identity Risk
🔒 BeyondTrust's 2026 predictions argue that the next major breaches will stem from unmanaged identity debt rather than simple phishing. The report highlights three identity-driven threats: agentic AI acting as privileged deputies vulnerable to prompt manipulation, automated "account poisoning" in financial systems, and long-dormant "ghost" identities surfacing in legacy IAM. The authors recommend an identity-first posture with strict least-privilege, context-aware controls, real-time auditing, and stronger identity governance.
Tue, October 28, 2025
How evolving regulations are redefining CISO responsibility
⚖️ CISOs are increasingly exposed to personal and even criminal liability as regulators such as the SEC, DOJ and international authorities press executives to disclose accurate cyber risk and incident information. Rising IoT/OT device vulnerabilities — with vulnerability-based breaches up 34% year over year and accounting for roughly 20% of breaches — are driving mandates like Executive Order 14028, NIS2 and the Cyber Resilience Act. Organizations are updating governance, improving asset inventories and adopting device intelligence tools like SomosID to correlate inventories, SBOM data and vulnerabilities, helping to support compliance and reduce executive exposure.
Fri, October 17, 2025
Identity Security: Your First and Last Line of Defense
⚠️ Enterprises now face a reality where autonomous AI agents run with system privileges, executing code and accessing sensitive data without human oversight. Fewer than 4 in 10 AI agents are governed by identity security policies, creating serious visibility and control gaps. Mature identity programs that use AI-driven identity controls and real-time data sync deliver stronger ROI, reduced risk, and operational efficiency. CISOs must move IAM from compliance checkbox to strategic enabler.
Tue, October 14, 2025
When Agentic AI Joins Teams: Hidden Security Shifts
🤖 Organizations are rapidly adopting agentic AI that does more than suggest actions—it opens tickets, calls APIs, and even remediates incidents autonomously. These agents differ from traditional Non-Human Identities because they reason, chain steps, and adapt across systems, making attribution and oversight harder. The author from Token Security recommends named ownership, on‑behalf tracing, and conservative, time‑limited permissions to curb shadow AI risks.
Fri, May 30, 2025
Chrome to Remove Default Trust for Two Root CAs from Store
🛡️ Chrome will stop trusting new TLS server certificates chaining to roots owned by Chunghwa Telecom and NetLock when the certificate's earliest Signed Certificate Timestamp (SCT) is dated after July 31, 2025. The change, effective in Chrome 139+ on Windows, macOS, ChromeOS, Android and Linux (not iOS), begins around August 1, 2025 and will show an interstitial for affected sites. Site operators should replace impacted certificates before expiry or use enterprise policies to add local trust to avoid user disruption.