Cyber Security
BeyondTrust Unveils AI-Powered True Privilege Graph to Expose Hidden Attack Paths

BeyondTrus has announced True Privilege, an AI-powered innovation within BeyondTrust’s Identity Security Insights that redefines identity security. True Privilege reveals the actual, effective access an identity — whether human, machine, or workload — holds within complex IT environments. By leveraging AI-driven graph analysis, True Privilege exposes hidden attack paths and the cascading effects of misconfigurations, offering unmatched visibility and risk reduction beyond traditional privileged account management (PAM).
John Lambert, formerly of the Microsoft Threat Intelligence Center, observed, “Defenders think in lists, attackers think in graphs.” True Privilege embraces this concept by mapping the relationships and interconnections between identities, accounts, and privileges that span the entire identity fabric of modern hybrid cloud environments as a graph, revealing hidden Paths to Privilege™ that other solutions miss.
With this latest Identity Security Insights innovation from BeyondTrust, organizations can:
- See their identity estate from an attacker’s perspective
- Understand the complex, indirect paths to privilege that could be exploited
- Prioritise the remediations that have the greatest impact on security posture across endpoints, servers, Cloud, and SaaS
- Easily share the analysis results with the rest of their security stack
“Organizations are overlooking the indirect ways that attackers can gain access to the privileges of human, machine, and workload identities due to increasingly interconnected systems, accumulated standing privilege, and silos most modern businesses are challenged with–but attackers aren’t overlooking these paths to privilege,” said Sam Elliott, SVP of Products at BeyondTrust. “They thrive in this complexity as it typically means an unprotected target is available. True Privilege addresses these challenges by revealing the actual, effective privileges an identity holds by uncovering the paths attackers can exploit. It’s not enough to find these paths; it’s essential to replace standing privilege with just-in-time (JIT) access to provide resilience when an identity is compromised.”
True Privilege leverages advanced AI and machine learning (ML) to analyze vast amounts of identity data from diverse sources, including Active Directory, Entra ID (formerly Azure Active Directory), Ping, Okta, Atlassian, GitHub, AWS, GCP, and many others, along with BeyondTrust identity security products. This analysis goes well beyond surface-level permissions or relying on data from password vaults. True Privilege calculates the actual, effective privilege of an identity, considering complex interactions, configurations, and current states, as well as detecting anomalous behavior that could indicate a breach.
As a result, True Privilege offers a level of visibility unmatched in the identity security market today. By continuously assessing risks and mapping interconnections across the identity landscape, True Privilege proactively identifies and addresses critical security issues. This holistic view provides contextually rich recommendations, empowering organizations to harden their security posture and disrupt potential attacks before they occur.
True Privilege offers a natural complement to traditional PAM approaches, going beyond simply managing privileged accounts to illuminate how all identities access privileges. It is currently the leading capability on the market that is able to fully eliminate silos to properly enable modern PAM. Identity Security Insights’ True Privilege amplifies other BeyondTrust solutions, such as Password Safe and Endpoint Privilege Management, by leveraging their inputs to enable the principle of least privilege (PoLP) and JIT for all enterprise use cases, as well as by leveraging a single user interface (Entitle) to gain JIT access to secrets, computers, cloud, and SaaS.
Cyber Security
GISEC Global 2025: Phishing, Data Breaches, Ransomware, and Supply Chain Attacks Causing Challenges

Maher Jadallah, the Vice President for Middle East and North Africa at Tenable, says effective exposure management requires a unified view of the entire attack surface (more…)
Cyber Security
GISEC Global 2025: A Place Where Innovation, Partnerships, and Leadership Come Together

Meriam ElOuazzani, the Senior Regional Director for META at SentinelOne, says, the company will showcase its latest developments in AI-powered security solutions, reinforcing its position as a leader in this area (more…)
Artificial Intelligence
Cequence Intros Security Layer to Protect Agentic AI Interactions

Cequence Security has announced significant enhancements to its Unified API Protection (UAP) platform to deliver a comprehensive security solution for agentic AI development, usage, and connectivity. This enhancement empowers organizations to secure every AI agent interaction, regardless of the development framework. By implementing robust guardrails, the solution protects both enterprise-hosted AI applications and external AI APIs, preventing sensitive data exfiltration through business logic abuse and ensuring regulatory compliance.
There is no AI without APIs, and the rapid growth of agentic AI applications has amplified concerns about securing sensitive data during their interactions. These AI-driven exchanges can inadvertently expose internal systems, create significant vulnerabilities, and jeopardize valuable data assets. Recognising this critical challenge, Cequence has expanded its UAP platform, introducing an enhanced security layer to govern interactions between AI agents and backend services specifically. This new layer of security enables customers to detect and prevent AI bots such as ChatGPT from OpenAI and Perplexity from harvesting organizational data.
Internal telemetry across Global 2000 deployments shows that the overwhelming majority of AI-related bot traffic, nearly 88%, originates from large language model infrastructure, with most requests obfuscated behind generic or unidentified user agents. Less than 4% of this traffic is transparently attributed to bots like GPTBot or Gemini. Over 97% of it comes from U.S.-based IP addresses, highlighting the concentration of risk in North American enterprises. Cequence’s ability to detect and govern this traffic in real time, despite the lack of clear identifiers, reinforces the platform’s unmatched readiness for securing agentic AI in the wild.
Key enhancements to Cequence’s UAP platform include:
- Block unauthorized AI data harvesting: Understanding that external AI often seeks to learn by broadly collecting data without obtaining permission, Cequence provides organizations with the critical capability to manage which AI, if any, can interact with their proprietary information.
- Detect and prevent sensitive data exposure: Empowers organizations to effectively detect and prevent sensitive data exposure across all forms of agentic AI. This includes safeguarding against external AI harvesting attempts and securing data within internal AI applications. The platform’s intelligent analysis automatically differentiates between legitimate data access during normal application usage and anomalous activities signaling sensitive data exfiltration, ensuring comprehensive protection against AI-related data loss.
- Discover and manage shadow AI: Automatically discovers and classifies APIs from agentic AI tools like Microsoft Copilot and Salesforce Agentforce, presenting a unified view alongside customers’ internal and third-party APIs. This comprehensive visibility empowers organizations to easily manage these interactions and effectively detect and block sensitive data leaks, whether from external AI harvesting or internal AI usage.
- Seamless integration: Integrates easily into DevOps frameworks for discovering internal AI applications and generates OpenAPI specifications that detail API schemas and security mechanisms, including strong authentication and security policies. Cequence delivers powerful protection without relying on third-party tools, while seamlessly integrating with the customer’s existing cybersecurity ecosystem. This simplifies management and security enforcement.
“Gartner predicts that by 2028, 33% of enterprise software applications will include agentic AI, up from less than 1% in 2024, enabling 15% of day-to-day work decisions to be made autonomously. We’ve taken immediate action to extend our market-leading API security and bot management capabilities,” said Ameya Talwalkar, CEO of Cequence. “Agentic AI introduces a new layer of complexity, where every agent behaves like a bidirectional API. That’s our wheelhouse. Our platform helps organizations embrace innovation at scale without sacrificing governance, compliance, or control.”
These extended capabilities will be generally available in June.
-
Artificial Intelligence1 week ago
Generative AI is Transforming Cybersecurity Across Detection, Defense, and Governance
-
Events1 week ago
OPSWAT Joins GISEC 2025 as Middle East Confronts AI-Driven Cyber Threats
-
Cyber Security1 week ago
Proofpoint Unveils Unified Solution for Workspace Cost, Cyber Risk Reduction
-
Cyber Security1 week ago
Kuwait Renews Cyber First Initiative to Strengthen Digital Defenses for Vision 2035
-
Artificial Intelligence7 days ago
Fortinet Expands FortiAI Across its Security Fabric Platform
-
Cyber Security1 week ago
AmiViz to Show Off the “Future of Cybersecurity” at GISEC 2025
-
Artificial Intelligence1 week ago
How AI is Reinventing Cybersecurity for the Automotive Industry
-
Cyber Security2 days ago
GISEC Global 2025: There’s a Rise in Malware and Ransomware Campaigns Moving From IT to OT Systems