home.social

#enterprise-security — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #enterprise-security, aggregated by home.social.

fetched live
  1. Though Google Cloud Next in Las Vegas was a couple weeks ago, I'm still working through it and trying to process everything I learned there. Three days, 32,000 attendees, 260 product announcements. One cool stand out...
    Google shipped an entire agent accountability infrastructure at this conference. Every AI agent now gets a cryptographic ID and an auditable action trail tied to a defined authorization policy. They built anomaly detection that flags unusual agent reasoning in real time and maps it back to the source.
    You build that when you're expecting things to go wrong at scale.
    GE Appliances is deploying 800 AI agents across manufacturing and supply chain right now. That's operational continuity with autonomous software making decisions without a human in the loop.
    Every enterprise leader needs to answer one question the technology doesn't answer for you: when an agent makes a decision that costs money or creates legal exposure, who owns it?
    I'm looking forward to diving deeper into Gemini Enterprise and Chrome Enterprise. The Chrome Enterprise shadow AI reporting shows you every unsanctioned AI tool your employees are already using. You can't govern what you can't see.

    cloud.google.com/blog/topics/g

    #AIGovernance #AgenticAI #GoogleNext #CIO #EnterpriseSecurity #security #privacy #cloud #infosec #cybersecurity #AI @google @googlecloud @googlecloudsec

  2. Nvidia just announced an open‑source AI agent platform built on its CUDA GPU stack, aiming to simplify building and deploying intelligent agents. The new NemoClaw security suite adds enterprise‑grade protection for AI workloads. Curious how this could reshape AI development and security? Dive into the details. #NvidiaAI #OpenSourceAI #NemoClaw #EnterpriseSecurity

    🔗 aidailypost.com/news/nvidia-la

  3. Licensing abuse case with financial scale.
    A Florida operator of Trinity Software Distribution was sentenced to 22 months in federal prison for trafficking Microsoft authentication labels and extracting product keys for resale.

    Operational elements:
    • Bulk purchase of COA labels
    • Manual key extraction workflow
    • Spreadsheet logging of license codes
    • Global bulk resale model
    • $5.1M+ wired to supplier
    Risk vectors exposed:
    - Software supply chain manipulation
    - License validation bypass attempts
    - Gray-market procurement exposure
    - Compliance audit failure risk
    Organizations purchasing below-market license keys may inadvertently expose themselves to legal and operational consequences.

    Are license audits part of your internal security and compliance posture?

    Source: therecord.media/florida-woman-

    Engage below.
    Follow @technadu for infosec, compliance, and cybercrime intelligence.
    Repost to inform your network.

    #Infosec #SoftwareCompliance #CyberCrime #Microsoft #DigitalFraud #ITGovernance #RiskManagement #EnterpriseSecurity #TechLaw #SecurityNews #CyberAwareness

  4. A recent Pentagon vendor cutoff exposed how many enterprises silently rely on hidden AI tools—think Claude, SDKs, and automated agents tucked away in Shadow IT. The fallout raises urgent questions about security, compliance, and true AI independence. Dive into the details to see what your organization might be missing. #AIDependencies #PentagonVendor #ShadowIT #EnterpriseSecurity

    🔗 aidailypost.com/news/pentagon-

  5. AI is accelerating change—while security teams still operate at human speed.
    youtu.be/w8aB1tm9XP0

    On Security Boulevard, Tom Hollingsworth, Fernando Montenegro, and Mitch Ashley examine the impact of AI moving at machine speed against governance-bound security workflows.

    #SecurityBoulevard #CyberSecurity #AI #EnterpriseSecurity #Automation #AIagents

  6. Security goes beyond AI. Identity and user security are hot topics at this year’s RSAC Conference.
    👉 youtu.be/t8yJxa0xG7o?si=yq-ZUP

    ▶️ On the Tech Field Day Podcast, Tom Hollingsworth, Jack Poller, and Drew Conry-Murray discuss non-AI security trends—from identity-based and non-human users to securing the browser—and how AI may add future context.

    #TFDPodcast #IdentitySecurity #Cybersecurity #EnterpriseSecurity

  7. ICYMI: As new AI tools enter workplaces, privacy risks don’t always come from where people expect.

    We analyzed 3 emerging AI tools and explained the real governance questions businesses should be asking before adoption.

    medium.com/@biytelum/3-emergin

    #DataPrivacy #AIgovernance #EnterpriseSecurity #ShadowAI

  8. OpenClaw just hit 160 000 ⭐ on GitHub, showing how shadow‑IT tools are becoming mainstream. Its AI‑driven local agent lets users bypass corporate controls, raising fresh enterprise‑security questions. How should orgs respond to unauthorized software and shifting user permissions? Dive into the analysis. #OpenClaw #ShadowIT #AIAGENT #EnterpriseSecurity

    🔗 aidailypost.com/news/openclaw-

  9. 🚨 New from the Socket Threat Research Team: 5 coordinated Chrome extensions hijack sessions and block security controls in enterprise HR and ERP platforms like Workday and NetSuite.

    Full report → socket.dev/blog/5-malicious-ch

  10. 🔐 RELIANOID & NIST Cybersecurity Framework Alignment

    At RELIANOID, security is built into both our Load Balancer and our internal operations. We align our product and organizational practices with the NIST Cybersecurity Framework (CSF) across its five core functions: Identify, Protect, Detect, Respond, and Recover.

    A structured, risk-based approach to cybersecurity—continuously reviewed and improved.

    relianoid.com/security-complia

  11. CW: Tier-0 System Failure is Inevitable (AI-Generated Cinematic Asset)

    T-0 Security. ELIMINATE AMBIGUITY. ECS: 99.9% LOGIC. The code you CANNOT corrupt is here. Wasm 0-Error Code that serves Military, G7, & Enterprise. FVP is accelerating the $30M Target. HIGH-SECURITY ARCHITECTS. Wasm Portal Author: www.gerardking.dev #Tier0Security #WebAssembly #HyperAxiom #PQC #FVP #ECS #cybersecurity #technology #art #PrivateEquity #EnterpriseSecurity #CTO #CIO #Infosec #IT #PostQuantum