Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Deep immersion in AI & NHI
Global Security

Deep immersion in AI & NHI

AdminBy AdminApril 10, 2025No Comments4 Mins Read
Identities Behind AI Agents
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 10, 2025Hacker NewsAI / Enterprise Security security

Identity standing behind AI agents

II agents developed rapidly from experimental technologies to major businesses. A Caters The frame clearly acknowledges that inhuman identities play a key role in Agen’s security. Their analysis Emphasizes how these autonomous software formations can make decisions, chain difficult actions together and work continuously without human intervention. They are no longer just tools, but also an integral part of your organization’s workforce.

Consider this reality: Today’s AI agents can analyze customer data, generate reports, manage system resources and even deploy the code, and all without clicking on one button. This shift is both a huge opportunity and an unprecedented risk.

AI agents are only the same as safe as their nhis

Here’s what security leaders do not necessarily consider: Agents II don’t work in isolation. To function, they need access to data, systems and resources. This very privileged, often ignored access happens through inhuman identity: API keys, Service accounts. Tokens oauthand other Machine credits.

These NHIS is a connective tissue between AI agents and digital assets of your organization. They determine what your labor force AI may not do.

Critical Understanding: While the AI ​​safety covers a set of facets Fixing AI agents fundamentally means fixing nhis they use. If the AI ​​agent cannot access sensitive data, it cannot expose. If its permits are correctly controlled, it cannot perform unauthorized actions.

AI agents – this is a multiplier force for NHI risks

AI AI agents increase existing NHI security problems that traditional security measures have not been developed to address:

  • They work at speed and scale machineperforming thousands of action in seconds
  • They chain several tools and permits So that the security groups could not predict
  • They work constantly Without the natural boundaries of the session
  • They require extensive access to the system To ensure the maximum value
  • They create new attack vectors In perennial architecture

AI agents require extensive and sensitive permits for interaction in several systems and environments, increasing the scale and complexity of NHI safety and management.

This creates serious security vulnerabilities:

  • Proliferation of AI shadows: Employees deploy unregistered AI agents using existing API keys without proper supervision, creating hidden charges that are stored even after a set of employees.
  • Fake identity and abuse of privileges: Attackers can steal extensive AI agent permits by gaining extensive access to several systems at the same time.
  • Invalid use of the AI ​​-compromise tool: Compromised agents can cause unauthorized workflows, modify data or gearing complex data on data, being legitimate system activity.
  • Exploitation of authorization of the internship: AI agents with multi -system access dramatically increase potential violations, turning a single compromise into a potentially catastrophic security event.

Fixing Agentic AI with Astrix

Astrix converts your AI security post providing Full control over inhuman identity What is the power of your agents II. Instead of fighting invisible risks and potential violations, you get immediate visibility soften the threats before they materialize.

Connecting each agent II to human property and Permanent monitoring of abnormal behaviorAstrix eliminates safe blind spots, simultaneously allows your organization to scale the adoption of II confidently.

Bottom line: dramatically decreased at risk, Suminated Posture of matchingand freedom to accept AI innovation without safety.

Stay in front of the curve

As organizations participate in the adoption of the II agents, those who implement proper NHI security control will realize the benefits, avoiding pitfalls. Reality is clear: In the AI ​​era, your organization’s security posture depends on how well you manage the digital identity that associate your AI workforce to your most valuable assets.

Want to know more about Astrix and NHI security? Visit Astrix.security

Found this article interesting? This article is a contribution to one of our esteemed partners. Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.