Normal view

Received yesterday — 12 December 2025

OpenAI built an AI coding agent and uses it to improve the agent itself

12 December 2025 at 17:16

With the popularity of AI coding tools rising among some software developers, their adoption has begun to touch every aspect of the process, including the improvement of AI coding tools themselves.

In interviews with Ars Technica this week, OpenAI employees revealed the extent to which the company now relies on its own AI coding agent, Codex, to build and improve the development tool. “I think the vast majority of Codex is built by Codex, so it’s almost entirely just being used to improve itself,” said Alexander Embiricos, product lead for Codex at OpenAI, in a conversation on Tuesday.

Codex, which OpenAI launched in its modern incarnation as a research preview in May 2025, operates as a cloud-based software engineering agent that can handle tasks like writing features, fixing bugs, and proposing pull requests. The tool runs in sandboxed environments linked to a user’s code repository and can execute multiple tasks in parallel. OpenAI offers Codex through ChatGPT’s web interface, a command-line interface (CLI), and IDE extensions for VS Code, Cursor, and Windsurf.

Read full article

Comments

© Mininyx Doodle via Getty Images

Received before yesterday

OpenAI releases GPT-5.2 after “code red” Google threat alert

11 December 2025 at 16:27

On Thursday, OpenAI released GPT-5.2, its newest family of AI models for ChatGPT, in three versions called Instant, Thinking, and Pro. The release follows CEO Sam Altman’s internal “code red” memo earlier this month, which directed company resources toward improving ChatGPT in response to competitive pressure from Google’s Gemini 3 AI model.

“We designed 5.2 to unlock even more economic value for people,” Fidji Simo, OpenAI’s chief product officer, said during a press briefing with journalists on Thursday. “It’s better at creating spreadsheets, building presentations, writing code, perceiving images, understanding long context, using tools and then linking complex, multi-step projects.”

As with previous versions of GPT-5, the three model tiers serve different purposes: Instant handles faster tasks like writing and translation; Thinking spits out simulated reasoning “thinking” text in an attempt to tackle more complex work like coding and math; and Pro spits out even more simulated reasoning text with the goal of delivering the highest-accuracy performance for difficult problems.

Read full article

Comments

© Benj Edwards / OpenAI

How to feel assured about cloud-native security with AI?

10 December 2025 at 17:00

Are Non-Human Identities (NHIs) the Missing Link in Your Cloud Security Strategy? Where technology is reshaping industries, the concept of Non-Human Identities (NHIs) has emerged as a critical component in cloud-native security strategies. But what exactly are NHIs, and why are they essential in achieving security assurance? Decoding Non-Human Identities in Cybersecurity The term Non-Human […]

The post How to feel assured about cloud-native security with AI? appeared first on Entro.

The post How to feel assured about cloud-native security with AI? appeared first on Security Boulevard.

How does Agentic AI empower cybersecurity teams?

10 December 2025 at 17:00

Can Agentic AI Revolutionize Cybersecurity Practices? Where digital threats consistently challenge organizations, how can cybersecurity teams leverage innovations to bolster their defenses? Enter the concept of Agentic AI—a technology that could serve as a powerful ally in the ongoing battle against cyber threats. By enhancing the management of Non-Human Identities (NHIs) and secrets security management, […]

The post How does Agentic AI empower cybersecurity teams? appeared first on Entro.

The post How does Agentic AI empower cybersecurity teams? appeared first on Security Boulevard.

A new open-weights AI coding model is closing in on proprietary options

10 December 2025 at 15:38

On Tuesday, French AI startup Mistral AI released Devstral 2, a 123 billion parameter open-weights coding model designed to work as part of an autonomous software engineering agent. The model achieves a 72.2 percent score on SWE-bench Verified, a benchmark that attempts to test whether AI systems can solve real GitHub issues, putting it among the top-performing open-weights models.

Perhaps more notably, Mistral didn’t just release an AI model, it released a new development app called Mistral Vibe. It’s a command line interface (CLI) similar to Claude Code, OpenAI Codex, and Gemini CLI that lets developers interact with the Devstral models directly in their terminal. The tool can scan file structures and Git status to maintain context across an entire project, make changes across multiple files, and execute shell commands autonomously. Mistral released the CLI under the Apache 2.0 license.

It’s always wise to take AI benchmarks with a large grain of salt, but we’ve heard from employees of the big AI companies that they pay very close attention to how well models do on SWE-bench Verified, which presents AI models with 500 real software engineering problems pulled from GitHub issues in popular Python repositories. The AI must read the issue description, navigate the codebase, and generate a working patch that passes unit tests. While some AI researchers have noted that around 90 percent of the tasks in the benchmark test relatively simple bug fixes that experienced engineers could complete in under an hour, it’s one of the few standardized ways to compare coding models.

Read full article

Comments

© Mistral / Benj Edwards

Securing MCP: How to Build Trustworthy Agent Integrations

10 December 2025 at 08:25
LLMs, prompt, MCP, Cato, AI, jailbreak, cybersecurity, DeepSeek, LLM, LLMs, attacks, multi-agent, Cybersecurity, AI, security, risk, Google AI LLM vulnerability

Model Context Protocol (MCP) is quickly becoming the backbone of how AI agents interact with the outside world. It gives agents a standardized way to discover tools, trigger actions, and pull data. MCP dramatically simplifies integration work. In short, MCP servers act as the adapter that grants access to services, manages credentials and permissions, and..

The post Securing MCP: How to Build Trustworthy Agent Integrations appeared first on Security Boulevard.

Microsoft drops AI sales targets in half after salespeople miss their quotas

3 December 2025 at 13:24

Microsoft has lowered sales growth targets for its AI agent products after many salespeople missed their quotas in the fiscal year ending in June, according to a report Wednesday from The Information. The adjustment is reportedly unusual for Microsoft, and it comes after the company missed a number of ambitious sales goals for its AI offerings.

AI agents are specialized implementations of AI language models designed to perform multistep tasks autonomously rather than simply responding to single prompts. So-called “agentic” features have been central to Microsoft’s 2025 sales pitch: At its Build conference in May, the company declared that it has entered “the era of AI agents.”

The company has promised customers that agents could automate complex tasks, such as generating dashboards from sales data or writing customer reports. At its Ignite conference in November, Microsoft announced new features like Word, Excel, and PowerPoint agents in Microsoft 365 Copilot, along with tools for building and deploying agents through Azure AI Foundry and Copilot Studio. But as the year draws to a close, that promise has proven harder to deliver than the company expected.

Read full article

Comments

© Wong Yu Liang via Getty Images

OAuth Isn’t Enough For Agents

2 December 2025 at 12:59
attacks, cyberattacks, cybersecurity, lobin, CISOs, encryption, organizations, recovery, Fenix24, Edgeless digital immunity, digital security, confidential Oracle recovery gateway, security

OAuth is a broadly accepted standard. It’s used all over the internet. But as the usage of LLM agents continues to expand, OAuth isn’t going to be enough. In fact, relying on OAuth will be dangerous. We won’t be able to set permissions at an appropriate granularity, giving LLMs access to far too much. More..

The post OAuth Isn’t Enough For Agents appeared first on Security Boulevard.

CrewAI GitHub Token Exposure Highlights the Growing Risk of Static Credentials in AI Systems

26 November 2025 at 11:56

3 min readAs AI platforms grow more complex and interdependent, small failures can cast long shadows. That’s what happened inside the open-source CrewAI platform, where a vulnerability in its error-handling logic surfaced during a provisioning failure. The resulting “exception response” – the message a service returns when it encounters an unhandled error during a request – contained […]

The post CrewAI GitHub Token Exposure Highlights the Growing Risk of Static Credentials in AI Systems appeared first on Aembit.

The post CrewAI GitHub Token Exposure Highlights the Growing Risk of Static Credentials in AI Systems appeared first on Security Boulevard.

Am I free to choose different Agentic AI frameworks?

25 November 2025 at 17:00

Are Non-Human Identities the Key to Secure Cloud Environments? How do we ensure our systems remain secure, especially when it comes to machine identities and their secrets? The management of Non-Human Identities (NHIs) is a crucial aspect of cybersecurity, offering a comprehensive approach to protecting machine identities and their associated credentials in the cloud. Understanding […]

The post Am I free to choose different Agentic AI frameworks? appeared first on Entro.

The post Am I free to choose different Agentic AI frameworks? appeared first on Security Boulevard.

How does Secrets Management deliver value in Agentic AI management?

24 November 2025 at 17:00

What Role Does Secrets Management Play in Harnessing Agentic AI? Where machines not only execute tasks but also make decisions, adapt, and evolve just like humans. This is the emerging frontier of Agentic AI, a transformative force. However, as promising as this technology is, its seamless and secure operation hinges significantly on effective Secrets Management. […]

The post How does Secrets Management deliver value in Agentic AI management? appeared first on Entro.

The post How does Secrets Management deliver value in Agentic AI management? appeared first on Security Boulevard.

How can Agentic AI be adaptable to regulatory changes?

24 November 2025 at 17:00

Why Is Managing Non-Human Identities Essential in Cloud Security? Non-Human Identities (NHIs) play an instrumental role in modern cybersecurity frameworks. But what exactly constitutes an NHI, and why is its management vital in safeguarding our digital? Machine identities, known as NHIs, are the digital equivalents of human identities and are instrumental in ensuring secure interactions […]

The post How can Agentic AI be adaptable to regulatory changes? appeared first on Entro.

The post How can Agentic AI be adaptable to regulatory changes? appeared first on Security Boulevard.

How does Agentic AI drive innovation in cloud security?

23 November 2025 at 17:00

How Are Non-Human Identities Transforming Cloud Security? Have you ever considered who—or what—is watching over your digital assets? A novel concept known as Non-Human Identities (NHIs) has emerged as a critical component in cloud security management. Unlike traditional security measures, NHIs offer a distinct advantage by bridging the gap between security teams and research & […]

The post How does Agentic AI drive innovation in cloud security? appeared first on Entro.

The post How does Agentic AI drive innovation in cloud security? appeared first on Security Boulevard.

How are Agentic AI systems kept safe from cyber threats?

23 November 2025 at 17:00

How Secure Are Your Non-Human Identities in the Cloud? Have you ever considered how machine identities are safeguarded within your organization’s architecture? If not, it’s time to delve into Non-Human Identities (NHIs) and understand their critical role in cybersecurity, especially for entities operating extensively. The Complex Landscape of NHIs NHIs are not merely artificial constructs […]

The post How are Agentic AI systems kept safe from cyber threats? appeared first on Entro.

The post How are Agentic AI systems kept safe from cyber threats? appeared first on Security Boulevard.

Can I be reassured of data integrity with Agentic AI?

23 November 2025 at 17:00

How Can Non-Human Identities Enhance Data Integrity in Agentic AI? Have you ever considered the silent guardians keeping your data safe, especially in a cloud-dominated environment? Non-Human Identities (NHIs) is a pivotal aspect of modern cybersecurity strategies, particularly when it comes to maintaining data integrity and ensuring the reliability of Agentic AI. Understanding Non-Human Identities […]

The post Can I be reassured of data integrity with Agentic AI? appeared first on Entro.

The post Can I be reassured of data integrity with Agentic AI? appeared first on Security Boulevard.

Why should I feel confident in adopting Agentic AI tech?

23 November 2025 at 17:00

How Secure Are Non-Human Identities in Today’s Cloud Environment? Are you confident in the security of non-human identities (NHIs) within your organization? With digital continues to expand, securing NHIs—machine identities consisting of encrypted credentials and permissions—becomes paramount. These identities, akin to “tourists” with a “passport” and “visa,” are integral to the smooth functioning of cloud-based […]

The post Why should I feel confident in adopting Agentic AI tech? appeared first on Entro.

The post Why should I feel confident in adopting Agentic AI tech? appeared first on Security Boulevard.

What makes a Agentic AI solution scalable?

22 November 2025 at 17:00

How Can Non-Human Identities Enhance Scalable AI Solutions? Have you ever considered the role Non-Human Identities (NHIs) play in enhancing scalable AI solutions? With the increasing reliance on technology, particularly in the cloud, managing NHIs is crucial for security and efficiency. Understanding NHIs involves knowing their components—machine identities and the secrets they hold—which are essential […]

The post What makes a Agentic AI solution scalable? appeared first on Entro.

The post What makes a Agentic AI solution scalable? appeared first on Security Boulevard.

Are AI security measures getting better annually

21 November 2025 at 17:00

How Can Organizations Ensure the Security of Non-Human Identities in the Cloud? How do organizations manage the security of machine identities and secrets? This question is at the forefront for companies across industries such as financial services, healthcare, and even travel, where the secure management of non-human identities (NHIs) is crucial for maintaining robust cybersecurity […]

The post Are AI security measures getting better annually appeared first on Entro.

The post Are AI security measures getting better annually appeared first on Security Boulevard.

How can I ensure secure interactions between Agentic AI systems?

21 November 2025 at 17:00

What Are Non-Human Identities in Cybersecurity, and How Can They Be Managed? How can organizations ensure robust security for their machine identities, commonly known as Non-Human Identities (NHIs)? These identities are critical in protecting sensitive data and maintaining a secure environment for AI-driven processes. Understanding the management of NHIs is crucial for addressing the unique […]

The post How can I ensure secure interactions between Agentic AI systems? appeared first on Entro.

The post How can I ensure secure interactions between Agentic AI systems? appeared first on Security Boulevard.

How do stable AI systems contribute to cloud security

20 November 2025 at 17:00

How Does Stability in AI Systems Enhance Cloud Security? Have you ever wondered how stable AI systems can revolutionize your organization’s cloud security? When industries evolve, the integration of AI into cybersecurity provides unique opportunities to enhance security measures, ensuring a safe and efficient environment for data management. The strategic importance of Non-Human Identities (NHIs) […]

The post How do stable AI systems contribute to cloud security appeared first on Entro.

The post How do stable AI systems contribute to cloud security appeared first on Security Boulevard.

Why are experts optimistic about future AI security technology

20 November 2025 at 17:00

How Secure Are Your Machine Identities in the Cloud Environment? Are machine identities flying under the radar when it comes to your cybersecurity strategy? Non-Human Identities (NHIs) are rapidly becoming a crucial element in organizations operating within cloud environments. These machine identities, often overlooked, are integral to maintaining robust security postures in industries ranging from […]

The post Why are experts optimistic about future AI security technology appeared first on Entro.

The post Why are experts optimistic about future AI security technology appeared first on Security Boulevard.

Can enterprises freely choose scalable Agentic AI solutions

20 November 2025 at 17:00

How Can Enterprises Make Informed Decisions About Scalable Agentic AI Solutions? Are enterprises truly free to choose scalable Agentic AI solutions that align with their evolving security needs? This question resonates across industries with organizations grapple with the complexities of integrating AI into their cybersecurity strategies. One of the most critical aspects of this integration […]

The post Can enterprises freely choose scalable Agentic AI solutions appeared first on Entro.

The post Can enterprises freely choose scalable Agentic AI solutions appeared first on Security Boulevard.

Are impenetrable AI-driven security systems realistic

19 November 2025 at 17:00

Can AI-Driven Security Systems Truly Be Impenetrable? When considering the complexities of modern cybersecurity, one question arises: can AI-driven security systems be genuinely impenetrable? The pursuit of robust digital protection is a constant endeavor, particularly within Non-Human Identities (NHIs) and Secrets Security Management. This discussion delves into how these components can redefine security strategies across […]

The post Are impenetrable AI-driven security systems realistic appeared first on Entro.

The post Are impenetrable AI-driven security systems realistic appeared first on Security Boulevard.

What makes AI-driven PAM solutions powerful

19 November 2025 at 17:00

How Can AI-Driven PAM Improve Non-Human Identity Management? Is your organization struggling to effectively manage and secure non-human identities (NHIs) amid the complexities of cloud environments? The answer may lie in leveraging AI-driven Privileged Access Management (PAM) solutions. Machine identities are as critical as human identities, making their management paramount in safeguarding sensitive data. Understanding […]

The post What makes AI-driven PAM solutions powerful appeared first on Entro.

The post What makes AI-driven PAM solutions powerful appeared first on Security Boulevard.

How certain can we be about cloud compliance with Agentic AI

18 November 2025 at 17:00

Are Non-Human Identities the Missing Link in Cloud Security? Are we adequately equipping ourselves against emerging threats? This question underscores the strategic importance of managing Non-Human Identities (NHIs) – crucial to bridging gaps in cloud security management. These machine identities, akin to digital “passports,” demand meticulous oversight to ensure that organizations can maintain secure cloud […]

The post How certain can we be about cloud compliance with Agentic AI appeared first on Entro.

The post How certain can we be about cloud compliance with Agentic AI appeared first on Security Boulevard.

Anthropic Disruption of an AI-Run Attack and What It Means for Agentic Identity

18 November 2025 at 19:33

4 min readAnthropic’s recent disclosure of an AI-driven espionage campaign it halted represents less a new class of attack than a faster, more persistent version of patterns the industry has seen before. What distinguishes this incident is the continuity of activity an autonomous system can sustain once it is given the ability to interpret its surroundings and […]

The post Anthropic Disruption of an AI-Run Attack and What It Means for Agentic Identity appeared first on Aembit.

The post Anthropic Disruption of an AI-Run Attack and What It Means for Agentic Identity appeared first on Security Boulevard.

What future innovations excite leaders in Agentic AI security

17 November 2025 at 17:00

How Are Non-Human Identities Transforming the Landscape of Cybersecurity? Have you ever considered what constitutes the “identity” of a machine where technology evolves at breakneck speed? The concept of Non-Human Identities (NHIs) is reshaping how organizations think about cybersecurity. More than just a technical term, NHIs combine machine identities and the secrets they hold. This […]

The post What future innovations excite leaders in Agentic AI security appeared first on Entro.

The post What future innovations excite leaders in Agentic AI security appeared first on Security Boulevard.

How adaptable are AI-driven security systems to new threats

17 November 2025 at 17:00

How Do AI-Driven Security Systems Keep Up with New Threats? How can organizations ensure their AI-driven security systems remain adaptable to new threats? With cyber threats grow in sophistication and frequency, the ability of security systems to adapt quickly becomes crucial. Non-Human Identities (NHIs) play a significant role in shaping how security frameworks respond to […]

The post How adaptable are AI-driven security systems to new threats appeared first on Entro.

The post How adaptable are AI-driven security systems to new threats appeared first on Security Boulevard.

How do I ensure my Agentic AI systems are safe

16 November 2025 at 17:00

What Are Non-Human Identities (NHIs) and Why Are They Crucial for Safe Agentic AI? Have you considered the growing importance of Non-Human Identities (NHIs), especially when it comes to safeguarding Agentic AI systems? Where organizations across various industries embrace the potential of artificial intelligence, there’s an urgent need to address the unique challenges these systems […]

The post How do I ensure my Agentic AI systems are safe appeared first on Entro.

The post How do I ensure my Agentic AI systems are safe appeared first on Security Boulevard.

What impact does Agentic AI have on cloud-native security

15 November 2025 at 17:00

How Can Organizations Safeguard Non-Human Identities in the Age of Agentic AI? How can robust management of Non-Human Identities (NHIs) and Secrets Security Management tighten your organization’s cybersecurity defenses? While the concept might sound futuristic, the impact is very real, especially in cloud-native environments. Let’s unravel how effective management of NHIs can mitigate potential security […]

The post What impact does Agentic AI have on cloud-native security appeared first on Entro.

The post What impact does Agentic AI have on cloud-native security appeared first on Security Boulevard.

Why is Agentic AI critical for future cybersecurity

15 November 2025 at 17:00

Have You Considered the Impact of Non-Human Identities on Cybersecurity? The future of cybersecurity is being reshaped by the rise of Agentic AI, but how does this affect our approach to managing Non-Human Identities (NHIs)? With cybersecurity demands evolve, professionals are pushed to rethink their strategies to accommodate this shift. I’ve seen how negligence in […]

The post Why is Agentic AI critical for future cybersecurity appeared first on Entro.

The post Why is Agentic AI critical for future cybersecurity appeared first on Security Boulevard.

Deriving Value from Enhanced NHI Security Protocols

14 November 2025 at 17:00

How Does the Management of Non-Human Identities (NHIs) Bridge Security Gaps? Cybersecurity is complex and multifaceted. Where machines and applications continuously interact and communicate with one another across various platforms, one may wonder how we can effectively manage these interactions to minimize security vulnerabilities. The concept of Non-Human Identities (NHIs) provides an intriguing solution when […]

The post Deriving Value from Enhanced NHI Security Protocols appeared first on Entro.

The post Deriving Value from Enhanced NHI Security Protocols appeared first on Security Boulevard.

Which technologies keep AI-driven security ahead of threats

14 November 2025 at 17:00

How Can AI-Driven Security Stay Ahead of Emerging Threats? What are the processes that ensure AI-driven security solutions tackle evolving threats efficiently? Where organizations transition to cloud environments, understanding and managing Non-Human Identities (NHIs) becomes crucial. NHIs represent machine identities that are foundational for maintaining robust cloud security. Integrating artificial intelligence (AI) enhances the management […]

The post Which technologies keep AI-driven security ahead of threats appeared first on Entro.

The post Which technologies keep AI-driven security ahead of threats appeared first on Security Boulevard.

How can Agentic AI enhance cybersecurity measures

14 November 2025 at 17:00

How Do Non-Human Identities Fit into Cybersecurity? How do machine identities, known as Non-Human Identities (NHIs), enhance the security of cloud environments? Where businesses increasingly migrate their operations to the cloud, understanding this aspect of cybersecurity becomes crucial. NHIs act as digital passports, combining encrypted secrets like passwords and tokens to grant access to systems. […]

The post How can Agentic AI enhance cybersecurity measures appeared first on Entro.

The post How can Agentic AI enhance cybersecurity measures appeared first on Security Boulevard.

How Safe Are Your NHIs in Hybrid Cloud Environments?

10 November 2025 at 17:00

Are Your NHIs in Hybrid Cloud Environments Truly Secure? Is your organization leveraging the benefits of a hybrid cloud environment while ensuring the security of its Non-Human Identities? NHIs, or machine identities, are increasingly pivotal where organizations shift more operations to the cloud. Yet, this shift presents unique challenges in securing these identities. A deeper […]

The post How Safe Are Your NHIs in Hybrid Cloud Environments? appeared first on Entro.

The post How Safe Are Your NHIs in Hybrid Cloud Environments? appeared first on Security Boulevard.

Can Your NHIs Withstand a Cyber Attack?

10 November 2025 at 17:00

Are You Optimizing Your NHIs for Cyber Attack Resilience? When faced with the myriad challenges of cybersecurity, have you considered how to optimize your Non-Human Identities (NHIs) for better protection against cyber threats? NHIs, representing machine identities, are increasingly targeted by cybercriminals in their quest for unauthorized system access. They comprise encrypted passwords, tokens, or […]

The post Can Your NHIs Withstand a Cyber Attack? appeared first on Entro.

The post Can Your NHIs Withstand a Cyber Attack? appeared first on Security Boulevard.

Why Trust in NHIs Is Essential for Business Security

10 November 2025 at 17:00

What Are Non-Human Identities (NHIs) in Cybersecurity? Have you ever considered the importance of trust within your organization’s cybersecurity framework? Trust is not just applicable to human interactions but also extends to non-human entities, specifically to Non-Human Identities (NHIs). NHIs are pivotal in cybersecurity, representing machine identities composed of encrypted passwords, tokens, or keys that […]

The post Why Trust in NHIs Is Essential for Business Security appeared first on Entro.

The post Why Trust in NHIs Is Essential for Business Security appeared first on Security Boulevard.

Get Excited: New Innovations in NHIs for Cloud Security

9 November 2025 at 17:00

How Do Non-Human Identities Revolutionize Cloud Security? Where technology powers every facet of our lives, how do organizations ensure that their digital ecosystems remain secure? Enter Non-Human Identities (NHIs), an emerging frontier in cybersecurity that ensures robust protection and oversight in cloud environments. But what exactly do NHIs entail, and why are they game-changers for […]

The post Get Excited: New Innovations in NHIs for Cloud Security appeared first on Entro.

The post Get Excited: New Innovations in NHIs for Cloud Security appeared first on Security Boulevard.

New AI Vulnerability Scoring System Announced to Address Gaps in CVSS

10 November 2025 at 00:51

AI Vulnerability Scoring

A new vulnerability scoring system has just been announced. The initiative, called the AI Vulnerability Scoring System (AIVSS), aims to fill the gaps left by traditional models such as the Common Vulnerability Scoring System (CVSS), which were not designed to handle the complex, non-deterministic nature of modern AI technologies.  AI security expert, author, and adjunct professor Ken Huang introduced the AIVSS framework, emphasizing that while CVSS has long been a cornerstone for assessing software vulnerabilities, it fails to capture the unique threat landscape presented by agentic and autonomous AI systems.  “The CVSS and other regular software vulnerability frameworks are not enough,” Huang explained. “These assume traditional deterministic coding. We need to deal with the non-deterministic nature of Agentic AI.”  Huang serves as co-leader of the AIVSS project working group alongside several prominent figures in cybersecurity and academia, including Zenity Co-Founder and CTO Michael Bargury, Amazon Web Services Application Security Engineer Vineeth Sai Narajala, and Stanford University Information Security Officer Bhavya Gupta.   Together, the group has collaborated under the Open Worldwide Application Security Project (OWASP) to develop a framework that provides a structured and measurable approach to assessing AI-related security threats.  According to Huang, Agentic AI introduces unique challenges because of its partial autonomy. “Autonomy is not itself a vulnerability, but it does elevate risk,” he noted. The AIVSS is designed specifically to quantify those additional risk factors that emerge when AI systems make independent decisions, interact dynamically with tools, or adapt their behavior in ways that traditional software cannot. 

A New Approach to AI Vulnerability Scoring 

The AI Vulnerability Scoring System builds upon the CVSS model, introducing new parameters tailored to the dynamic nature of AI systems. The AIVSS score begins with a base CVSS score and then incorporates an agentic capabilities assessment. This additional layer accounts for autonomy, non-determinism, and tool use, factors that can amplify risk in AI-driven systems. The combined score is then divided by two and multiplied by an environmental context factor to produce a final vulnerability score.  A dedicated portal, available at aivss.owasp.org, provides documentation, structured guides for AI risk assessment, and a scoring tool for practitioners to calculate their own AI vulnerability scores.  Huang highlighted a critical difference between AI systems and traditional software: the fluidity of AI identities. “We cannot assume the identities used at deployment time,” he said. “With agentic AI, you need the identity to be ephemeral and dynamically assigned. If you really want to have autonomy, you have to give it the privileges it needs to finish the task.”  

Top Risks in Agentic AI Systems 

The AIVSS project has also identified the ten most severe core security risks for Agentic AI, though the team has refrained from calling it an official “Top 10” list. The current risks include: 
  • Agentic AI Tool Misuse 
  • Agent Access Control Violation 
  • Agent Cascading Failures 
  • Agent Orchestration and Multi-Agent Exploitation 
  • Agent Identity Impersonation 
  • Agent Memory and Context Manipulation 
  • Insecure Agent Critical Systems Interaction 
  • Agent Supply Chain and Dependency Attacks 
  • Agent Untraceability 
  • Agent Goal and Instruction Manipulation 
Each of these risks reflects the interconnected and compositional nature of AI systems. As the draft AIVSS document notes, “Some repetition across entries is intentional. Agentic systems are compositional and interconnected by design. To date, the most common risks such as Tool Misuse, Goal Manipulation, or Access Control Violations, often overlap or reinforce each other in cascading ways.”  Huang provided an example of how this manifests in practice: “For tool misuse, there shouldn’t be a risk in selecting a tool. But in MCP systems, there is tool impersonation, and also insecure tool usage.” 

Ensuring Stability in Cyber Security with NHIs

8 November 2025 at 17:00

Are Organizations Maximizing the Potential of Non-Human Identities? The importance of managing Non-Human Identities (NHIs) cannot be overstated. But how effectively are organizations leveraging these capabilities to enhance stable cybersecurity? NHIs—often referred to as machine identities—are pivotal in safeguarding secrets security management and ensuring robust protection across multiple sectors. Data management and cybersecurity experts have […]

The post Ensuring Stability in Cyber Security with NHIs appeared first on Entro.

The post Ensuring Stability in Cyber Security with NHIs appeared first on Security Boulevard.

Getting Better Security: The Critical Role of NHIs

6 November 2025 at 17:00

How Does Non-Human Identity Management Improve Cybersecurity? Have you ever wondered how managing identities that aren’t human can enhance the security of your organization? The notion of security extends beyond just safeguarding data from unauthorized human access. It encompasses protecting non-human identities (NHIs) that play a crucial role. The Essentials of Non-Human Identities in Cybersecurity […]

The post Getting Better Security: The Critical Role of NHIs appeared first on Entro.

The post Getting Better Security: The Critical Role of NHIs appeared first on Security Boulevard.

Securing Agentic AI: Extending Network Security Principles to Serverless Environments

4 November 2025 at 15:09
digital twin

As enterprise AI rapidly matures, we’re entering a new phase, one powered by agentic AI. These intelligent agents are more autonomous, capable of making decisions, taking actions, and adapting dynamically to new environments. This evolution introduces new complexity in how we build AI systems as well as in how we secure them. Agentic AI doesn’t..

The post Securing Agentic AI: Extending Network Security Principles to Serverless Environments appeared first on Security Boulevard.

Innovating Cyber Defense with Enhanced NHIDR

3 November 2025 at 17:00

How Does Managing Non-Human Identities Revolutionize Cyber Defense? How can organizations enhance their defenses while managing the myriad of machine identities that populate their networks? The answer lies in Non-Human Identities (NHIs), which is revolutionizing cyber defense and creating a fortress of innovation within clouds. Understanding the Vital Role of NHIs in Cybersecurity Non-Human Identities, […]

The post Innovating Cyber Defense with Enhanced NHIDR appeared first on Entro.

The post Innovating Cyber Defense with Enhanced NHIDR appeared first on Security Boulevard.

Bridging the Trust Gap with 1Password

3 November 2025 at 12:55

We have spent what seems like an eternity of our careers trying to wrangle access issues. We set up our shiny SSO portals, federate the big apps, and feel pretty good. We have a “bubble” of control. But that bubble popped. Reality is a chaotic mess of Software-as-a-Service (SaaS) sprawl, personal devices accessing corporate data,..

The post Bridging the Trust Gap with 1Password appeared first on Security Boulevard.

Get Excited About Innovations in Secrets Sprawl Control

2 November 2025 at 17:00

Are You Embracing the Transformative Power of Non-Human Identities? Digital is evolving rapidly, and non-human identities (NHIs) are increasingly becoming integral to cybersecurity frameworks across various industries. But how are organizations harnessing the power of NHIs to enhance secrets management and secure cloud? Unpacking Non-Human Identities: The New Cybersecurity Frontier Machine identities, or NHIs, are […]

The post Get Excited About Innovations in Secrets Sprawl Control appeared first on Entro.

The post Get Excited About Innovations in Secrets Sprawl Control appeared first on Security Boulevard.

How Can NHIs Ensure a More Secure Cloud?

2 November 2025 at 17:00

Are You Fully Harnessing the Power of Non-Human Identities for Cloud Security? When pondering the intricate tapestry of cloud security, one might ask: Are non-human identities (NHIs) the missing link in your organization’s cybersecurity strategy? With digital transformation continues to cross new frontiers, managing and securing these machine identities becomes an indispensable cornerstone of safeguarding […]

The post How Can NHIs Ensure a More Secure Cloud? appeared first on Entro.

The post How Can NHIs Ensure a More Secure Cloud? appeared first on Security Boulevard.

Smart Strategies for Non-Human Identity Protection

1 November 2025 at 18:00

How Does Non-Human Identity Management Boost Cybersecurity? Where digital transformation accelerates, how can organizations ensure robust security for non-human identities (NHIs)? Understanding NHIs is pivotal for businesses that aim to safeguard their digital assets effectively. NHIs, essentially machine identities used in cybersecurity, play a crucial role in maintaining the integrity and security of a cloud-based […]

The post Smart Strategies for Non-Human Identity Protection appeared first on Entro.

The post Smart Strategies for Non-Human Identity Protection appeared first on Security Boulevard.

❌