Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns

April 24, 2026

n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

April 24, 2026

UK Biobank Breach: Health Data of 500,000 Listed for Sale in China

April 24, 2026
Facebook X (Twitter) Instagram
Saturday, April 25
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Google Introduces Unique AI Agent Identities in New Gemini Enterprise
News

Google Introduces Unique AI Agent Identities in New Gemini Enterprise

Team-CWDBy Team-CWDApril 23, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Google is betting big on agentic AI and wants professionals to track their AI agents on its new hub Gemini Enterprise Agent Platform.

Introduced a few months after the launch of Gemini Enterprise, the Agent Platform is Google’s new hub to manage agentic AI workflows for both Google-made and external AI agents.

The platform aims to bring together with a series of existing and new capabilities. Among them, the Agent Platform enables users to assign every agent a unique cryptographic ID that will be referred to for every action an agent takes.

These agent IDs are designed to be mapped back to “defined authorization policies that are traceable and auditable,” said Thomas Kurian, Google Cloud’s CEO, speaking at the Google Cloud Next 26 conference, held in Las Vegas from April 22 to April 24.

“We’re bringing zero trust verification to every agent and at every orchestration step,” he added.

Tackling A New Class of Identity Risk

AI agents are poised to disrupt identity management for security professionals.

While traditional non-human identities (NHIs), such as API keys or service accounts, are deterministic, AI agents are autonomous and goal oriented. They are capable of understanding a high-level goal, breaking it down into steps and independently executing a series of actions across various applications to achieve that goal.

This introduces new types of dynamic digital entities which act on behalf of humans and make independent operational decisions.

Agent identities will be listed on Google Cloud’s Gemini Enterprise Agent Platform in Agent Registry, a central library that indexes every internal agent, tool and skill.

Finally, the Agent Platform will also feature Agent Gateway, a single dashboard to manage a fleet of AI agents. This includes enforcing policies for all agent-to-agent and agent-to-tool connections and interactions, supporting several agentic AI protocols like model context protocol (MCP) and Agent2Agent (A2A).

“It provides secure, unified connectivity between agents and tools across any environment, while enforcing consistent security policies and Model Armor protections to safeguard against prompt injection and data leakage,” said a Google Cloud statement published on April 22.

Model Armor is Google Cloud’s own guardrail layer against adversarial attacks, including prompt injection, sensitive data leaks and harmful content.

Francis deSouza, COO of Google Cloud, said that security teams need to identify agents, both authorized and unauthorized, used across their workforce. 

“When you roll out authorized agents, you want to manage their access control, what they should have access to and that may change over time in a way that’s more dynamic than human identities,” he added.

Watch now: How AI and Verifiable Credentials Are Redefining Digital Identities

Agent Security Dashboard and Anomaly Detection Introduced

At Cloud Next 26, Google Cloud also unveiled Agent Anomaly Detection, a new feature which uses statistical models and a large language model (LLM) as-a-judge framework to identify unusual behavior in real time, flagging potential threats like suspicious reasoning patterns.

Anomaly Detection works alongside the existing Agent Threat Detection, which monitors malicious activities such as reverse shells and connections to known bad IP addresses.

Another addition is the Agent Security dashboard, powered by Google Cloud’s Security Command Center (SCC), which unifies threat detection and risk analysis within Google Cloud Platform (GCP) environments.

Google Cloud said this new dashboard will help security teams map relationships between AI agents and models, automate asset discovery and scan for vulnerabilities in operating systems and language packages.

These new capabilities build on Gemini Enterprise’s existing security tools, including Agent Compliance and Agent Policy, which already provide policy enforcement capabilities.

Google Cloud Pushes Deeper into Agentic AI and Cybersecurity

The Gemini Enterprise Agent Platform launch and release of Google’s new agentic AI security capabilities were among a flurry of Google Cloud announcements at Cloud Next 26.

Israeli cloud security firm Wiz, acquired by Google in 2025, has expanded its AI-Application Protection Platform (AI-APP) to embed security directly into developer workflows.

The updates bring real-time vulnerability scanning, AI-generated code security, a dynamic AI bill-of-materials (AIBOM) offering and automated remediation into platforms like AI development solution Lovable, integrated development environments (IDEs) and version control systems.

Google also released three new agents for cybersecurity professionals. The Threat Hunting agent aims to help security teams proactively hunt for novel attack patterns and stealthy adversary behaviors that bypass traditional defenses.

The Detection Engineering agent is designed to identify coverage gaps and create new detections for threat scenarios, reducing toil and transforming detection creation from a manual craft into an automated science. They are both available in preview mode.

Finally, coming soon to preview, Google’s Third-Party Context agent has been created to enrich security teams’ workflows with contextual data from third-party content.

When available, the three agents will be integrated into Google Security Operations, the firm’s security analytics, threat detection and incident response platform.

Google claimed that its Triage and Investigation agent, introduced in April 2025, processed over five million alerts in the last year, “reducing a typical 30-minute manual analysis to 60 seconds.”

Finally, Google released a new dark web intelligence feature in Google Threat Intelligence, now available in preview.

The tech firms said that internal tests showed the feature can analyze millions of daily external events with 98% accuracy to elevate threats that truly matter.

Google also launched two AI-focused processing chips, the Tensor Processing Unit 8t (TPU 8t) for AI training and the Tensor Processing Unit 8i for AI inference.

Finally, Google also committed to invest $750m in a new agentic AI partner fund available for global consulting firms, systems integrators, software partners and channel partners.

The fund’s goal is to support AI value identification, agentic AI prototyping, agent building and deployment and upskilling.

Read now: How Security Leaders Can Safeguard Against Vibe Coding Security Risks

Image credit: gguy / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams
Next Article Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities
Team-CWD
  • Website

Related Posts

News

AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns

April 24, 2026
News

n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

April 24, 2026
News

UK Biobank Breach: Health Data of 500,000 Listed for Sale in China

April 24, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

A quick guide to recovering a hacked account

March 21, 2026

What parents should know to protect their children from doxxing

November 28, 2025

What is it, and how do I get it off my device?

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.