Normal view
How is AI security evolving for better protection?
How Can Non-Human Identities Enhance AI Security? What are the key challenges faced by organizations in managing cybersecurity for machine identities? With digital systems continue to evolve, cybersecurity professionals are increasingly focusing on the protection and management of Non-Human Identities (NHIs). These machine identities play a pivotal role in ensuring robust AI security and better […]
The post How is AI security evolving for better protection? appeared first on Entro.
The post How is AI security evolving for better protection? appeared first on Security Boulevard.
How do NHIs deliver value in digital security landscapes?
Is Your Organization Missing Out on the Value of Non-Human Identities in Digital Security? The rapid expansion of cloud environments has ushered in a powerful yet complex challenge: managing digital identities that aren’t tied to any one person. These Non-Human Identities (NHIs), which often take the form of machine identities, are integral to a secure […]
The post How do NHIs deliver value in digital security landscapes? appeared first on Entro.
The post How do NHIs deliver value in digital security landscapes? appeared first on Security Boulevard.
How does AI ensure calm in cybersecurity operations?
The Strategic Role of Non-Human Identities in AI-Powered Cybersecurity Operations What is the role of Non-Human Identities (NHIs) in achieving seamless security for your organization? With digital continues to expand, cybersecurity professionals face the challenges of managing complex systems and ensuring secure operations. NHIs, which are essentially machine identities, play a pivotal role, acting as […]
The post How does AI ensure calm in cybersecurity operations? appeared first on Entro.
The post How does AI ensure calm in cybersecurity operations? appeared first on Security Boulevard.
FBI Accessed Windows Laptops After Microsoft Shared BitLocker Recovery Keys
How do NHIs empower agile cybersecurity strategies?
How Do Organizations Secure Machine Identities Effectively? Have you ever considered how machine identities, or Non-Human Identities (NHIs), impact cybersecurity in cloud environments? NHIs act as the digital passports for machines, governing how they interact with systems and data. With organizations increasingly relying on automated systems and cloud-based services, effective NHI management is more crucial […]
The post How do NHIs empower agile cybersecurity strategies? appeared first on Entro.
The post How do NHIs empower agile cybersecurity strategies? appeared first on Security Boulevard.
How proactive can Agentic AI be in threat detection?
The Crucial Intersection: Non-Human Identities and AI in Cybersecurity What role do Non-Human Identities (NHIs) play in cybersecurity? Traditional human-centric security measures are no longer sufficient. The emergence of NHIs, or machine identities, is reshaping how organizations approach security threats, particularly when integrated with Proactive Agentic AI for threat detection. Understanding Non-Human Identities: A New […]
The post How proactive can Agentic AI be in threat detection? appeared first on Entro.
The post How proactive can Agentic AI be in threat detection? appeared first on Security Boulevard.
Can managing NHIs keep companies ahead in cybersecurity?
How Do Non-Human Identities (NHIs) Shape the Future of Cybersecurity? Have you ever considered the risks associated with the identities of machines in your network? With cybersecurity professionals continue to confront increasingly complex threats, a crucial, often overlooked area is the management of Non-Human Identities (NHIs) and their associated secrets. Integrating NHI management into an […]
The post Can managing NHIs keep companies ahead in cybersecurity? appeared first on Entro.
The post Can managing NHIs keep companies ahead in cybersecurity? appeared first on Security Boulevard.
Data Leak Exposes 149M Logins, Including Gmail, Facebook
A massive unsecured database exposed 149 million logins, raising concerns over infostealer malware and credential theft.
The post Data Leak Exposes 149M Logins, Including Gmail, Facebook appeared first on TechRepublic.
-
All News – Federal News Network
- FedRAMP is getting faster, new automation and pilots promise approvals in months, not years
FedRAMP is getting faster, new automation and pilots promise approvals in months, not years
Interview transcript
Terry Gerton We’re going to talk about one of everybody’s favorite topics, FedRAMP. It’s been around for years, but agencies are still struggling to get modern tools. So from your perspective, why is the process so hard for software and service companies to get through?
Irina Denisenko It’s a great question. Why is it so hard to get through FedRAMP? It is so hard to get through FedRAMP because at the end of the day, what is FedRAMP really here to do? It’s here to secure cloud software, to secure government data sitting in cloud software. You have to remember this all came together almost 15 years ago, which if you remember 15 years ago, 20 years ago, was kind of early days of all of us interacting with the internet. And we were still even, in some cases, scared to enter our credit card details onto an online website. Fast forward to today, we pay with our face when we get on our phone. We’ve come a long way. But the reality is cloud security hasn’t always been the, of course, it’s secure. In fact, it has been the opposite. Of course, its unsecure and it’s the internet and that’s where you go to lose all your data and all your information. And so long story short, you have to understand that’s were the government is coming from. We need to lock everything down in order to make sure that whether it’s VA patient data, IRS data on our taxpayers, obviously anything in the DoW, any sort of information data there, all of that stays secure. And so that’s why there are hundreds of controls that are applied to cloud environments in order make sure and double sure and triple sure that that data is secure.
Terry Gerton You lived the challenge first-hand with your own company. What most surprised you about the certification process when you tackled it yourself? What most surprise me?
Irina Denisenko When we tackled FedRAMP ourselves for the first time was that even if you have the resources and specifically if you $3 million to spend, you know, $3 million burning a hole in your pocket doesn’t happen often, but even if have that and you have staff on the U.S. Soil and you have the willingness to invest all of that for a three-year process to get certified, that is still not enough. What you need on top of that is an agency to say yes to sponsoring you. And when they say yes, to sponsoring you what they are saying yes to you is to take on your cyber risk. And specifically what they’re saying yes to is to spend half a million dollars of taxpayer money of agency budget, typically using contractors, to do an initial security review of your application. And then to basically get married to you and do something called continuous monitoring, which is a monthly meeting that they’re going to have with you forever. They, that agency is going to be your accountability partner and ultimately the risk bearer of you, the software provider, to make sure you are burning down all of the vulnerabilities, all of these CVEs, every finding in your cloud environment on the timeline that you’re supposed to do that. And that ends up costing an agency about $250,000 a year, again, in the form of contractors, tooling, etc. That was the most surprising to me, that again, even as a cloud service provider, who’s already doing business with JP Morgan and Chase, you know, healthcare systems, you name it, even that’s not enough, you need an agency sponsor, because at the end of the day, it’s the agency’s data and they have to protect it. And so they have do that triple assurance of, yes, you said you’re doing the security stuff, but let us confirm that you’re doing the the security stuff. That was the most surprising to me. And why, really, ultimately, we started Knox Systems, because what we do at Knox is we enable the inheritance model. So we are doing all of that with our sponsoring agencies, of which we have 15. Knox runs the largest FedRAMP managed cloud. And what that means is we host the production environment of our customers inside of our FedRAMP environment across AWS, Azure, and GCP. And our customers inherit our sponsors. So they inherit the authorization from the treasury, from the VA, from the Marines, etc., Which means that the Marines, the Treasury, the VA, didn’t have to spend an extra half a million upfront and $250k ongoing with every new application that was authorized. They are able to get huge bang for their buck by just investing that authorization, that sponsorship into the Knox boundary. And then Knox does the work and the hard work to ensure the security and ongoing authorization and compliance of all of the applications that we bring into our environment.
Terry Gerton I’m speaking with Irina Denisenko. She’s the CEO of Knox Systems. So it sounds like you found a way through the maze that was shorter, simpler, less expensive. Is FedRAMP 20X helping to normalize that kind of approach? How do you see it playing out?
Irina Denisenko Great question. FedRAMP 20X is a phenomenal initiative coming out of OMB-GSA. And really the crux of that is all about machine-readable and continuous authorization. Today, when I talked about continuous monitoring, that’s a monthly meeting that happens. And I kid you not, we, as a cloud service provider, again, we secure Adobe’s environment and many others, we come with a spreadsheet, an actual spreadsheet that has all of the vulnerabilities listed from all the scans we’ve done over the last month, and anything that is still open from anything prior months. And we review that spreadsheet, that actual Excel document, and then after the meet with our agencies and then, after that meeting, we upload that spreadsheet into a system called USDA on the FedCiv side, eMass, DOW side, DISA side. And then they, on their side, download that spreadsheet and they put it into other systems. And I mean, that’s the process. I think no one is confused, or no one would argue that surely there’s a better way. And a better would be a machine readable way, whether that’s over an API, using a standard language like OSCAL. There’s lots of ways to standardize, but it doesn’t have to be basically the equivalent of a clipboard and a pencil. And that’s what FedRAMP 20X is doing. It’s automating that information flow so that not only is it bringing down the amount of just human labor that needs to be done to do all this tracking, but more importantly, this is cloud security. Just because you’re secure one second doesn’t mean you’re secure five seconds from now, right? You need to be actively monitoring this, actively reporting this. And if it’s taking you 30 days to let an agency know that you have a critical vulnerability, that’s crazy. You, you got to tell them in, you know, five minutes after you find out or, you know to put a respectable buffer, a responsible buffer to allow you to mitigate remediate before you notify more parties, maybe it’s a four day buffer but it’s certainly not 30 days. That’s what FedRAMP20X is doing. We’re super excited about it. We are very supportive of it and have been actively involved in phase I and all subsequent phases.
Terry Gerton Right, so phase II is scheduled to start shortly in 2026. What are you expecting to see as a result?
Irina Denisenko Well, phase I was all about FedRAMP low, phase II is all about FedRAMP moderate. And we expect that, you know, it’s going to really — FedRAMP moderate is realistically where most cloud service offerings sit, FedRAMP moderate and high. And so that’s really the one that the FedRAMP needs to get right. What we expect to see and hope to see is to have agencies actually authorized off of these new frameworks. The key is really going to be what shape does FedRAMP 20x take in terms of machine readable reporting on the security posture of any cloud environment? And then of course, the industry will standardize around that. So we’re excited to see what that looks like. And also how much AI does the agency, the GSA, OMB and ultimately FedRAMP leverage because there is a tremendous amount of productivity, but also security that AI can provide. It can also introduce a lot of risks. And so we’re all collaborating with that agency, as well as we’re excited to see what, you know, where they draw the bright red lines and where they embrace AI.
Terry Gerton So phase II is only gonna incorporate 10 companies, right? So for the rest of the world who’s waiting on these results, what advice do you have for them in the meantime? How can companies prepare better or how can companies who want to get FedRAMP certified now best proceed?
Irina Denisenko I think the end of the day the inheritance model that Knox provides — and, you know, we’re not the only ones, actually there’s two key players.; it’s ourselves and Palantir. There’s a reason hat large companies like Celonis like OutSystems like BigID like Armis who was just bought by ServiceNow for almost $8 billion. There’s reason that all those guys choose Knox and there’s a reason Anthropic chose Palantir and Grafana chose Palantir, because regardless, FedRAMP 20X, Rev 5, doesn’t matter, there is a massive, massive premium put on getting innovative technology in the hands of our government faster. We have a window right now with the current administration prioritizing innovative technology and commercial off-the-shelf. You know, take the best out of Silicon Valley and use it in the government or out of Europe, out of Israel, you name it, rather than build it yourself, customize it until you’re blue in the face and still get an inferior product. Just use the best and breed, right? But you need it to be secure. And we have this window as a country. We have a window as country for the next few years here to get these technologies in. It takes a while to adopt new technologies. It takes awhile to do a quantum leap, but I’ll give you a perfect example. Celonis, since becoming FedRAMPed on August 19th with Knox — they had been trying to get FedRAMPed for five years — since getting FedRAMPed on august 19th, has implemented three agencies. And what do they do? They do process mining and intelligence. They’re an $800 million company that’s 20 years old that competes, by the way, head on with Palantir’s core product, Foundry and Gotham and so on. They’ve implemented three agencies already to drive efficiency, to drive visibility, to drive process mining, to driving intelligence, to drive AI-powered decision-making. And that’s during the holidays, during a government shutdown, it’s speed that we’ve never seen before. If you want outcomes, you need to get these technologies into the hands of our agencies today. And so that’s why, you know, we’re such big proponents of this model, and also why, our agencies, our federal advisory board, which includes the DHS CISO, the DOW CIO, the VA CIO are also supportive of this because ultimately it’s about serving the mission and doing it now. Rather than waiting for some time in the future.
The post FedRAMP is getting faster, new automation and pilots promise approvals in months, not years first appeared on Federal News Network.

© Getty Images/iStockphoto/Kalawin
Data Leak Exposes 149M Logins, Including Gmail, Facebook
A massive unsecured database exposed 149 million logins, raising concerns over infostealer malware and credential theft.
The post Data Leak Exposes 149M Logins, Including Gmail, Facebook appeared first on TechRepublic.
Browser Wars, Continued: Why Everyone Is Building Their Own AI Browser
Written by Vivek Ramachandran, SquareX Founder, for Forbes Technology Council. This article originally appeared here.

If you lived through the 1990s, you’ll remember the first of the “ browser wars,” where Netscape and Internet Explorer fiercely competed for market dominance. Then Google launched Chromium in 2008, and this battle effectively ended. The past 17 years have been relatively quiet in the browser space-most new challengers, including Edge, are built on Chromium, and Chrome has slowly grown to own over 70% of the market. Until now.
This is the year of AI browsers. Following the release of Perplexity’s Comet and OpenAI’s ChatGPT Atlas, Atlassian made a deal to acquire The Browser Company. Even incumbents like Chrome, Edge and Firefox have released their own AI features for their consumer browsers. So, what’s driving this sudden browser renaissance?
Why Do Companies Want To Own The Browser Space?
Thanks to hyperscalers and the pandemic, the past decade has seen a major shift in the modern way of working. Most enterprise applications are now SaaS apps, and, in 2022, around 62% of enterprise data was stored in the cloud (with that number expected to be much higher today)-both of which are accessed through browsers. Effectively, the browser has become the new endpoint.
In other words, by owning the browser space, one owns an essential infrastructure layer-the single point of access to every application, workflow and data that users interact with online. This is partly why the U.S. Department of Justice attempted to force Google to divest Chrome, and why the proposition of owning the browser space is so compelling to many technology companies.
Technological “Why Now?”: The AI Evolution
Since ChatGPT’s launch in November 2022, generative AI (GenAI) has evolved through three distinct generations, each expanding AI’s scope of action and potential impact. The first generation introduced LLM-powered AI chatbots such as ChatGPT and Claude, as well as specialized API wrappers like Grammarly and GitHub Copilot. However, it wasn’t until January 2025 that OpenAI released Operator, the first true browser AI agent that can autonomously act on the user’s behalf, performing tasks like booking flight tickets and scheduling meetings. This served as the foundation for AI browsers.
For many technology companies, AI browsers became an unprecedented strategic opportunity to enter the browser race-a market that had been virtually impenetrable for over a decade due to Google’s dominance. With the release of agentic AI, it’s now possible to build AI browsers capable of autonomous reasoning, decision making and executing complex multistep tasks. New entrants can now offer value by changing the way people fundamentally browse the internet, making the AI browser a more compelling differentiator from incumbent consumer browsers than any browser innovation we’ve seen in recent years.
Security Implications Of AI Browsers: The Weakest Link
Yet, one major security implication of AI browsers is that security teams are now dealing with autonomous agents that complete tasks on the user’s behalf without the security awareness of an employee. Already, we’ve been seeing attacks on AI browsers that lead to these AI agents exfiltrating data, downloading malware and providing unauthorized access to enterprise apps without the user knowing. These AI browsers have the same privilege level as users, allowing them to access every enterprise app and sensitive information that the user can access.
Unfortunately, traditional security solutions like SASE/SSEs have no way to differentiate between tasks performed by a user and those performed by the AI browser, as the network traffic originates from the same browser. As AI agents and AI browsers become the new “weakest link,” this calls for the security industry to rethink the way enterprise security infrastructure is built, taking into account agentic identity, agentic data loss prevention (DLP) and attacks on agentic workflows.
In an increasingly agentic future, the browser won’t only act as a window to the web but as the primary workspace for autonomous agents and human-AI collaboration. This shift will make browsers more powerful, intelligent and deeply personalized, but also heighten the urgency for advanced browser security, as more sensitive actions and data flow through them than ever before.
Secure Any Browser and Any Device
SquareX’s browser extension turns any browser on any device into an enterprise-grade secure browser. SquareX’s industry-first Browser Detection and Response (BDR) solution empowers organizations to proactively defend against browser-native threats including rogue AI agents, Last Mile Reassembly Attacks, malicious extensions and identity attacks. Unlike dedicated enterprise browsers, SquareX seamlessly integrates with users’ existing consumer browsers, delivering security without compromising user experience.
Visit sqrx.com to learn more or sign up for an enterprise pilot.
![]()
Browser Wars, Continued: Why Everyone Is Building Their Own AI Browser was originally published in SquareX Labs on Medium, where people are continuing the conversation by highlighting and responding to this story.
The post Browser Wars, Continued: Why Everyone Is Building Their Own AI Browser appeared first on Security Boulevard.
149M Logins from Roblox, TikTok, Netflix, Crypto Wallets Found Online
Researchers say Russian government hackers were behind attempted Poland power outage
-
All News – Federal News Network
- Billington CyberSecurity Cyber and AI Outlook Series Episode 5: ROI for AI: Setting Goals and Tracking Outcomes
Billington CyberSecurity Cyber and AI Outlook Series Episode 5: ROI for AI: Setting Goals and Tracking Outcomes
Accreditation: Training Certificate for 1 CPE*
AI tools promise faster threat detection, reduced analyst workload and greater resilience, but government agencies often lack clear frameworks for setting objectives or assessing impact.
In this webinar, government and industry experts explore how federal organizations can establish mission-aligned goals for AI systems, measure REAL cybersecurity outcomes and track effectiveness over time.
Learning objectives:
- Identifying needs and setting goals to make sure mission outcomes are driving AI efforts
- Measuring and understanding progress and performance of AI-oriented goals
- Linking the building blocks and best practices of successful programs that enable ROI
Complimentary Registration
Please register using the form on this page. Participants can earn 1 CPE credit in Information Technology. To receive CPE credit you must arrive on time and participate in the attendance surveys throughout the webinar. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE. For more information regarding complaint and program cancellation policies, please contact FederalNewsNetwork.com at (202) 895-5023. Due to this program being offered free of charge, there will be no refunds issued.
Additional Information
Prerequisites and Advance Preparation: Basic experience in federal IT recommended, but not required.
Program Level: Beginner
Delivery Method: Group Internet-Based Training
By providing your contact information to us, you agree: (i) to receive promotional and/or news alerts via email from Federal News Network and our third party partners, (ii) that we may share your information with our third party partners who provide products and services that may be of interest to you and (iii) that you are not located within the European Economic Area.
Federal News Radio, part of the Federal News Network, is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org.
The post Billington CyberSecurity Cyber and AI Outlook Series Episode 5: ROI for AI: Setting Goals and Tracking Outcomes first appeared on Federal News Network.

© Getty Images/KanawatTH
Okta Uncovers Custom Phishing Kits Built for Vishing Callers
They can intercept user credentials while providing real-time context that helps attackers convince victims to approve MFA challenges during phone calls..
The post Okta Uncovers Custom Phishing Kits Built for Vishing Callers appeared first on TechRepublic.
Venezuelan Nationals Face Deportation After Multi State ATM Jackpotting Scheme
This $120 AI Security Training Bundle is Now Only $30
Learn to use AI safely, prep for CompTIA professional certifications, and more with lifetime access on sale now for only $29.99.
The post This $120 AI Security Training Bundle is Now Only $30 appeared first on TechRepublic.
Anthropic, Microsoft MCP Server Flaws Shine a Light on AI Security Risks
Researchers with Cyata and BlueRock uncovered vulnerabilities in MCP servers from Anthropic and Microsoft, feeding ongoing security worries about MCP and other agentic AI tools and their dual natures as both key parts of the evolving AI world and easy targets for threat actors.
The post Anthropic, Microsoft MCP Server Flaws Shine a Light on AI Security Risks appeared first on Security Boulevard.
From Incident to Insight: How Forensic Recovery Drives Adaptive Cyber Resilience
When ransomware cripples a business’s systems or stealthy malware slips past defenses, the first instinct is to get everything back online as quickly as possible. That urgency is understandable — Cybersecurity Ventures estimates ransomware damage costs $156 million per day. But businesses cannot let speed overshadow the more pressing need to understand exactly what happened,..
The post From Incident to Insight: How Forensic Recovery Drives Adaptive Cyber Resilience appeared first on Security Boulevard.