CMOtech UK - Technology news for CMOs & marketing decision-makers

Secrets Management stories

Story 301609

Okta unveils blueprint to lock down AI agents at work

Yesterday
#
robots
#
data protection
#
siem
Okta sets out blueprint and tools to corral workplace AI agents, promising tighter discovery, access control and rapid kill switches.
Glowing locked cloud icon with multicolor public private hybrid

Entrust launches cloud cryptographic security platform

Last week
#
private cloud
#
hybrid cloud
#
digital transformation
Entrust unveils cloud-based cryptographic security platform to centralise key, certificate and secrets management across hybrid IT estates.
Atlassian williams

Keeper & Williams F1 launch identity-first security push

Last week
#
data protection
#
digital transformation
#
pam
Keeper Security has kicked off a global identity-first cybersecurity campaign as it enters a third season backing the Atlassian Williams F1 team.
Hybrid cloud network stolen digital identity glowing key figure

Google report warns identity is weak link in cloud

Last week
#
malware
#
ransomware
#
hybrid cloud
Attackers are ditching malware for stolen identities, misconfigurations and abused AI tools, Google warns in its latest cloud threat report.
Moody engineer cicd pipelines morphing into shadowy hands vaults

JFrog flags 13 critical CI/CD flaws in GitHub workflows

This month
#
siem
#
fintech
#
application security
JFrog warns 13 GitHub CI/CD workflow flaws, mostly critical, could let attackers hijack pipelines and steal secrets at scale.
Asian engineer cybersecurity breach red warnings cloud repos

Claude Code flaws expose new risks in AI dev tools

This month
#
devops
#
cloud security
#
application security
Claude Code flaws found by Check Point could let malicious repos run code and grab API keys before developers confirm a project is trusted.
It sec ops room analysts lock network and jira style board view

Keeper connects Jira workflows with privileged access

This month
#
siem
#
digital transformation
#
pam
Keeper launches native Jira integrations to tie security incident workflows directly to privileged access approvals while retaining zero-knowledge controls.
Sleek secure cloud fortress interlocking shields identity access

BeyondTrust named Leader in 2026 GigaOm CIEM Radar

This month
#
hybrid cloud
#
hyperscale
#
pam
BeyondTrust's Pathfinder platform has been named a Leader and Outperformer in GigaOm's 2026 CIEM Radar, praised for unified identity security.
Moody businessperson faces split deepfake screen ai security threats

AI tops data security worries as identity risks surge

Last month
#
data protection
#
digital transformation
#
encryption
AI has become firms' top data security fear as identity and deepfake threats surge, exposing gaps in visibility, encryption and governance.
Moody datacenter ai face circuitry over broken locks security threat

AI emerges as the leading global data security threat

Last month
#
data protection
#
digital transformation
#
encryption
AI has overtaken all other threats as the top global data security risk, with firms warning its rapid spread magnifies existing vulnerabilities.
Crystal password vault with quantum particles and broken locks

Keeper deploys Kyber to shield passwords from quantum

Last month
#
data protection
#
pam
#
mdm
Keeper adopts NIST's Kyber post-quantum cryptography in its password tools, aiming to shield credentials from future quantum attacks.
Cloudy asia pacific skyline ai data streams cyber risk art

AI, cloud adoption driving new surge in cyber exposure

Last month
#
data protection
#
digital transformation
#
pam
Rapid AI and cloud adoption is fuelling a new wave of cyber risk, as Tenable warns of exposed software supply chains and “ghost” identities.
Ai cloud puzzle shields dark gaps leaking data hidden keys

Tenable warns of widening AI exposure gap in cloud

Last month
#
malware
#
digital transformation
#
public cloud
Tenable warns businesses that rapid AI and cloud adoption is creating an invisible exposure gap as identity and supply chain risks surge.
Ciso in dark ops room facing cloud ai chasm moody us scene

Tenable warns AI outpacing security, widening risk gap

Last month
#
pam
#
cloud security
#
application security
Tenable warns cloud and AI adoption is creating a widening 'zero‑margin' security gap as exposure grows faster than defenders can respond.
Adfinis

Adfinis unveils flat-fee OpenBao-based secrets service

Last month
#
devops
#
encryption
#
cloud security
Adfinis launches Secretz Enterprise, a flat-fee OpenBao-based secrets service promising up to 50% savings and 24/7 support.
Dim server room admin workstation security shield network nodes

12Port unveils AI session intelligence for PAM security

Last month
#
data protection
#
pam
#
mfa
12Port adds AI-powered session intelligence to its agentless PAM platform, promising real-time detection and disruption of risky admin activity.
Cybersecurity engineer in dim ops room green cli devops monitor

Keeper adds SuperShell terminal for secure vault work

Last month
#
devops
#
pam
#
mfa
Keeper rolls out SuperShell, a full-screen terminal interface in Keeper Commander for keyboard-first, zero-trust vault and PAM workflows.
It admin server room zero trust remote access rdp ssh vnc telnet

Portnox expands zero trust access to console tools

Last month
#
firewalls
#
vpns
#
network security
Portnox extends zero trust network access to RDP, SSH, VNC and Telnet, promising passwordless admin access and fewer VPN dependencies.
Cinematic glowing server room unlocked cabinet data breach void

Moltbook 'vibe-coded' flaw exposed AI chats & keys

Last month
#
dr
#
cloud security
#
application security
Moltbook left a Supabase key exposed, leaking AI chats, 30,000 emails and 1.5 million API keys in a cautionary tale of vibe coding risk.
Ai ghost hand server room software supply chain breach night

Developers' AI agents pose rising software supply risks

Last month
#
data protection
#
cloud security
#
application security
Developers granting AI agents broad, unsupervised access to code and systems are creating new software supply chain and data exposure risks.