Connect with us

Cyber Security

CyberArk Launches Machine Identity Security for All Workload Environments

Published

on

CyberArk has announced the availability of CyberArk Secure Workload Access Solution,1 delivering the industry’s most comprehensive protection for all non-human identities that matter. The solution will enable security teams to gain visibility and control over the entire machine identity lifecycle, from creation and governance to automated rotation and renewal.

Machine identities proliferate in cloud-native architectures, including applications, workloads, and automated processes. Unlike solutions focusing on singular machine identity types, CyberArk’s layered approach will enable organizations to enforce least privilege, mitigate risk, and prevent credential-based attacks for all workloads across hybrid and multi-cloud environments.

In addition, CyberArk has extended its discovery and context capabilities, designed to help security teams take the first steps to modernize workload authentication by assessing, understanding and eliminating risks tied to unprotected machine identities. These automated capabilities help teams generate an inventory of secrets, certificates and information about their environment, understand the risk of compromise tied to each machine identity and prioritize mitigation actions.

“Modern, cloud and ephemeral workloads mean authentication can be fragmented, making access control challenging and resulting in a large, unprotected attack surface that dramatically increases the risk of breaches,” said Kurt Sand, GM of Machine Identity Security at CyberArk. “Recent high-profile attacks have highlighted the urgent need for a modern, identity-first model that enforces universal and unique workload identities to help organizations confidently secure workloads across their entire hybrid and multi-cloud estate.”

The core of the Secure Workload Access Solution is CyberArk Workload Identity Manager. This lightweight, distributed, and cloud-native machine identity issuer goes beyond traditional Public Key Infrastructure (PKI) systems that cannot scale to the needs of ephemeral cloud workloads. The new solution will integrate Workload Identity Manager with CyberArk Secrets Manager, enabling secure access for all workloads as cloud-native and containerized environments grow.

The CyberArk Secure Workload Access Solution will allow workloads running in virtualized environments to be automatically identified for access to cloud services and cloud provider environments, securing dynamic, cloud-native workloads like Kubernetes and service mesh. It will provide the capability to:

  1. Securely connect on-premises and cloud workloads across environments with unique and universal SPIFFE2 identities that work with existing identities, applications, clouds and SaaS services.
  2. Integrate seamlessly with secrets management for existing API key and access token authentication, as well as other secrets.
  3. Discover and assess risk across all workloads, making it easier to detect threats, enforce security policies and prevent unauthorized access.
Continue Reading

Cyber Security

GISEC Global 2025: Phishing, Data Breaches, Ransomware, and Supply Chain Attacks Causing Challenges

Published

on

Maher Jadallah, the Vice President for Middle East and North Africa at Tenable, says effective exposure management requires a unified view of the entire attack surface (more…)

Continue Reading

Cyber Security

GISEC Global 2025: A Place Where Innovation, Partnerships, and Leadership Come Together

Published

on

Meriam ElOuazzani, the Senior Regional Director for META at SentinelOne, says, the company will showcase its latest developments in AI-powered security solutions, reinforcing its position as a leader in this area (more…)

Continue Reading

Artificial Intelligence

Cequence Intros Security Layer to Protect Agentic AI Interactions

Published

on

Cequence Security has announced significant enhancements to its Unified API Protection (UAP) platform to deliver a comprehensive security solution for agentic AI development, usage, and connectivity. This enhancement empowers organizations to secure every AI agent interaction, regardless of the development framework. By implementing robust guardrails, the solution protects both enterprise-hosted AI applications and external AI APIs, preventing sensitive data exfiltration through business logic abuse and ensuring regulatory compliance.

There is no AI without APIs, and the rapid growth of agentic AI applications has amplified concerns about securing sensitive data during their interactions. These AI-driven exchanges can inadvertently expose internal systems, create significant vulnerabilities, and jeopardize valuable data assets. Recognising this critical challenge, Cequence has expanded its UAP platform, introducing an enhanced security layer to govern interactions between AI agents and backend services specifically. This new layer of security enables customers to detect and prevent AI bots such as ChatGPT from OpenAI and Perplexity from harvesting organizational data.

Internal telemetry across Global 2000 deployments shows that the overwhelming majority of AI-related bot traffic, nearly 88%, originates from large language model infrastructure, with most requests obfuscated behind generic or unidentified user agents. Less than 4% of this traffic is transparently attributed to bots like GPTBot or Gemini. Over 97% of it comes from U.S.-based IP addresses, highlighting the concentration of risk in North American enterprises. Cequence’s ability to detect and govern this traffic in real time, despite the lack of clear identifiers, reinforces the platform’s unmatched readiness for securing agentic AI in the wild.

Key enhancements to Cequence’s UAP platform include:

  • Block unauthorized AI data harvesting: Understanding that external AI often seeks to learn by broadly collecting data without obtaining permission, Cequence provides organizations with the critical capability to manage which AI, if any, can interact with their proprietary information.
  • Detect and prevent sensitive data exposure: Empowers organizations to effectively detect and prevent sensitive data exposure across all forms of agentic AI. This includes safeguarding against external AI harvesting attempts and securing data within internal AI applications. The platform’s intelligent analysis automatically differentiates between legitimate data access during normal application usage and anomalous activities signaling sensitive data exfiltration, ensuring comprehensive protection against AI-related data loss.
  • Discover and manage shadow AI: Automatically discovers and classifies APIs from agentic AI tools like Microsoft Copilot and Salesforce Agentforce, presenting a unified view alongside customers’ internal and third-party APIs. This comprehensive visibility empowers organizations to easily manage these interactions and effectively detect and block sensitive data leaks, whether from external AI harvesting or internal AI usage.
  • Seamless integration: Integrates easily into DevOps frameworks for discovering internal AI applications and generates OpenAPI specifications that detail API schemas and security mechanisms, including strong authentication and security policies. Cequence delivers powerful protection without relying on third-party tools, while seamlessly integrating with the customer’s existing cybersecurity ecosystem. This simplifies management and security enforcement.

“Gartner predicts that by 2028, 33% of enterprise software applications will include agentic AI, up from less than 1% in 2024, enabling 15% of day-to-day work decisions to be made autonomously. We’ve taken immediate action to extend our market-leading API security and bot management capabilities,” said Ameya Talwalkar, CEO of Cequence. “Agentic AI introduces a new layer of complexity, where every agent behaves like a bidirectional API. That’s our wheelhouse. Our platform helps organizations embrace innovation at scale without sacrificing governance, compliance, or control.”

These extended capabilities will be generally available in June.

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.