Authentication stories
Fraud fears in Canada’s online classifieds may ease as buyers and sellers on Kijiji can now verify their identities before trading.
Marketplace sales tripled in EMEA and Asia-Pacific last year as Google Cloud rewarded Ping Identity for work on passwordless access and AI controls.
AI agents are set to erode ad-funded web traffic, forcing businesses to pivot from screen-based funnels to metered API revenue.
Businesses facing faster AI-driven cyberattacks will get new Google Cloud tools to spot threats, block fraud and secure agents across workloads.
New guidance aims to help firms curb data leakage and rogue actions as AI agents and models are embedded in daily operations.
Many firms are failing to turn AI trials into production systems, with poor controls and weak data forcing almost half of projects to stall.
Breach risk stays high for smaller firms because stolen credentials and weakly joined controls let attackers slip past existing tools.
Cardholders will get protection from AI agent mistakes as the payments group extends its network safeguards to software-led purchases.
Human approval will stay central as Ledger rolls out hardware controls for AI agents handling wallets, identities and sensitive transactions.
The new system aims to help businesses turn stalled generative AI pilots into measurable returns by unifying customer data and oversight.
The hire comes as enterprises in Asia Pacific and Japan face rising demand for identity security in AI-driven systems and real-time access control.
AI tools are making more firms reassess SaaS, but Thoughtworks says legacy systems and enterprise risk will keep custom builds selective.
Developers can now deploy cloud-hosted Claude agents without building the supporting infrastructure, as Anthropic handles security, tracing and state management.
Most firms are not ready for AI-driven API attacks, with Salt saying 92% have yet to reach advanced security maturity.
A 1,151% jump in iOS injection attacks in late 2025 has put mobile identity checks under fresh pressure, iProov says.
Weak identity controls are now driving most attacks on Australian organisations, with breaches hitting revenue, customers and supply chains.
Hundreds of Microsoft 365 users are being compromised daily as attackers bypass passwords with device code phishing and OAuth tokens.
Non-technical teams can now build live business apps with data, permissions and security built in, Softr says.
Rising identity-based attacks and exposed cloud services are forcing Australian organisations to rethink security assumptions as threats accelerate.
Breaches in large cloud environments are increasingly tied to weak identity controls, misconfigurations and poor data sovereignty governance.