
Myriad360 & Cyera launch AI-powered data security tool for AWS
The DSHA leverages Cyera's Data Security Posture Management (DSPM) platform and operates as a turnkey service. It enables organisations to detect and classify sensitive information, enforce compliance requirements, and enhance operational efficiencies across cloud-native infrastructures such as Amazon S3 and RDS. The solution processes over 120 file formats and automates risk identification, aiding in the formulation of remediation plans without manual effort.
This new service aims to address the challenges that enterprises face as they scale up their artificial intelligence (AI) initiatives and cloud migrations. Fast and accurate data discovery, coupled with actionable insights for compliance, are core to DSHA's offering, with the solution reportedly delivering results within hours.
Assessing data risk
The platform has been deployed in operational environments where it identified over 9.3 million sensitive records shortly after rollout. During the same deployment, it uncovered 357 vulnerable data stores, 63 of which were classified as ghost datastores. According to Myriad360, the DSHA reduced manual triage time and the frequency of data loss prevention (DLP) false positives by as much as 80%, and also flagged the presence of European PII stored outside of GDPR-compliant locations.
DSHA's integration with AWS means customers benefit from seamless compatibility with their existing AWS-native infrastructure. The intention, both companies state, is to enable organisations to adopt advanced solutions for data protection and AI readiness at scale without compromising security standards.
Executive perspectives
Heather Case-Hall, Technical Author & Data Security Leader at Myriad360, emphasised the importance of robust security measures, particularly with the expansion of AI capabilities in enterprises. She said, Our clients face increasing pressure to reduce risk and prove compliance - especially with emerging AI adoption. This collaboration with Cyera allows us to deliver not just visibility, but a clear remediation roadmap that bridges security and business outcomes.
The role of contextual understanding of data was highlighted by Troy Gabel, Head of DLP at Cyera. He remarked, Security leaders today need more than just protection - they need clarity and control over their data so they can move fast without taking on unnecessary risk. Cyera's unique strength is context - we don't just show where data lives, but who can access it, how it's being used, and what it means to the business. With Myriad360's DSHA framework, we're turning that vision into action and delivering measurable impact in complex AWS environments - fast.
Tim Donovan, AWS Cloud Success Manager at Myriad360, underscored the scalability and automation provided by the solution. He commented, Myriad360 is committed to helping customers meet their security and compliance needs with scalable, automated solutions. The Myriad360 DSHA powered by Cyera brings an innovative offering to AWS customers looking to mature their data protection and AI readiness.
The impact of offering DSHA via AWS Marketplace was described by Alpesh Shah, VP of Security Strategic Alliance at Myriad360, who stated, Myriad360 truly understands the power of the AWS Marketplace and its ability to simplify the procurement of SaaS solutions. With this new marketplace offering in collaboration with Cyera, Myriad360 has expanded its AWS relationship, enabling clients to leverage this unique solution. We encourage customers to take advantage of Myriad360's security engineering expertise.
Cloud environments and compliance
The DSHA's objective is to streamline compliance and data security in line with growing demands for cloud-based infrastructure and AI-driven workloads. Organisations deploying large-scale AI projects need to ensure they do not inadvertently expose sensitive or regulated data, and the DSHA is positioned as a tool for facilitating this process within AWS frameworks.
By rapidly surfacing security risks and providing a framework for actionable remediation, Myriad360 and Cyera are aiming to strengthen enterprise cloud strategies, ensuring that organisations achieve greater transparency and control over their data assets as compliance regulations and operational requirements continue to evolve.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Techday NZ
2 days ago
- Techday NZ
Ventia adopts AI platform to speed up major infrastructure bids
Ventia has implemented an AI-powered platform, developed in partnership with DXC Technology, to streamline its bid writing process for major infrastructure contracts across Australia and New Zealand. Automation of bid writing The new platform, known as Tendia, automates the search, collation, and drafting of early-stage bid content – a process previously measured in days, now reduced to minutes. The solution is designed to help Ventia's teams prepare responses more quickly and accurately for complex, high-value tenders within its extensive operations. Tendia was developed by DXC's data, AI, and cloud experts, utilising Amazon Web Services (AWS) technologies including Amazon Bedrock and Kendra. The system is trained on Ventia's historical submissions to ensure that its outputs are relevant and accurate for current tender requirements. More than 10,000 AWS-certified professionals at DXC have contributed technical and security support to ensure the solution is viable at scale and enterprise-ready. The implementation of Tendia is seen as a practical demonstration of generative AI's expanding role beyond pilot projects, addressing complicated, document-heavy business processes at enterprise scale. Operational benefits for Ventia Ventia, one of the largest infrastructure service providers in the region, previously faced significant time and resource challenges preparing major tenders. The company has access to a workforce of more than 35,000 people operating across over 400 sites. Addressing these pressures was a primary driver for developing an AI-powered solution that could assist its teams in focusing on higher-value work within the bidding process. "Working with DXC, we've been able to improve the speed and quality of our bid development process. Tendia enables our teams to focus on higher-value work, deliver more accurate proposals, and respond faster to complex, multi-million-dollar tenders. This project marks the first phase of Ventia's broader AI adoption strategy to improve how we support clients and deliver services across the business." Ventia's General Manager for Strategy, Digital & Corporate Affairs, Em Hogan, pointed to these advantages, noting that the initiative is part of a wider programme to extend AI adoption across the organisation and its services. Technical background and partnership DXC's data, AI, and cloud teams worked closely with Ventia throughout the project, integrating AWS services such as Amazon Fargate, Kendra, and Cognito to deliver the Tendia solution. These components enable rapid, context-aware content generation and secure access for teams across different business units and geographies. "This collaboration shows how AI can support business-critical operations – within the public sector," said Seelan Nayagam, President, Asia Pacific, Middle East & Africa, DXC Technology. "We have drawn on our global scale and cross-industry AI experience to help Ventia turn an initial concept into an enterprise-ready solution. With over 10,000 AWS skilled resources and more than 15,000 experts trained through DXC's AI Academy and AI-Xcelerate programs, we're delighted to be supporting Ventia as it extends AI applications across more parts of its business," said Nayagam. DXC emphasised that its partnership with Ventia demonstrates how technology and global expertise can be applied to overcome barriers to generative AI use within critical business functions. The company's Consulting & Engineering Services team has a remit to operate and optimise mission-critical systems, including the co-creation and delivery of solutions based on automation and AI technologies. Productivity and security considerations The deployment of Tendia comes against a backdrop of growing demand for efficiency and accuracy in high-stakes processes such as infrastructure tenders. By automating the early stages of bid development, Ventia expects its staff to be able to dedicate more time to the strategic aspects of crafting proposals tailored to client needs and sector requirements. Tendia's support for compliance and data security is grounded in DXC's scale and AWS certifications, providing additional assurance for both technology stakeholders and business users. Both organisations have indicated that the platform's introduction represents only the initial stage in broader AI integration efforts across Ventia's operations, with further developments and expansions expected in the future.


Techday NZ
4 days ago
- Techday NZ
When trusted tools go rogue: The return of the ‘Confused Deputy Problem'
A decades-old cybersecurity vulnerability is staging a dangerous comeback, and this time it involves modern tools and has far-reaching consequences. Known as the 'Confused Deputy Problem,' this flaw sees trusted software - such as administrative tools, privileged scripts, or even AI agents - being manipulated to misuse their powers on behalf of less-privileged applications operating autonomously or by users. And in today's rapidly evolving threat landscape, the consequences are more severe than ever. From compiler quirk to enterprise crisis The confused deputy problem isn't new. First described by computer scientist Norm Hardy in 1988, it referred to a case where a compiler (legitimately empowered to write to billing files) was tricked by less-privileged applications into overwriting those sensitive files. The applications themselves didn't have the necessary access, but the compiler acted on their behalf, unwittingly executing their intent. Fast forward to today, and this fundamental breakdown of privilege separation is now playing out in some of the most advanced enterprise systems, including those that rely on artificial intelligence, automation, and cloud-native infrastructure. In most modern enterprises, trusted systems or processes - like automation scripts, CI/CD pipelines, and privileged service accounts - are the deputies. These programs are entrusted with elevated access because they serve as conduits to essential business functions. However, if they lack mechanisms to evaluate the context of the commands and honour least privilege performing functions, they can be exploited just as easily as Hardy's compiler. The problem becomes even more alarming when applied to Agentic AI which are tools that act independently to complete tasks using delegated authority. If these AI agents are manipulated into making requests or executing operations they weren't intended to, they become confused deputies on a much larger scale. Real-world risks The confused deputy issue surfaces in multiple ways across enterprise IT today. These include: SuDo misuse: Scripts with superuser privileges can be hijacked by untrusted inputs, elevating user privilege without directly attacking the OS. Scripts with superuser privileges can be hijacked by untrusted inputs, elevating user privilege without directly attacking the OS. CI/CD exploits: Shared service accounts in development pipelines can be coerced into leaking secrets or deploying malicious artifacts, especially in the absence of role isolation and context validation. Shared service accounts in development pipelines can be coerced into leaking secrets or deploying malicious artifacts, especially in the absence of role isolation and context validation. Cloud token abuse: In AWS or Azure environments, services can inadvertently use their assumed roles to fulfill malicious requests initiated by compromised peers, turning secure microservices into agents of privilege escalation. Why the problem persists Despite increasing awareness and tooling, the confused deputy problem persists largely because enterprises have not fully embraced the principle of least privilege. That is, systems, applications, and users continue to have more access than they need. What's more, the explosion of machine identities, such as automated services, scripts, bots, and now AI agents, has made it far harder to track privilege boundaries. Machines now communicate with other machines more frequently than humans do, and without adequate oversight, these interactions become fertile ground for exploitation. Reimagining Privileged Access Management To confront this resurgent threat, businesses must rethink their approach to Privileged Access Management (PAM). It's no longer enough to store secrets or manage user credentials. Modern PAM must be dynamic, context-aware, and tightly integrated into every aspect of the IT ecosystem. Key strategies to consider include: Command validation and filtering: Systems should whitelist commands, sanitise inputs, and block privilege escalation via indirect parameters. Systems should whitelist commands, sanitise inputs, and block privilege escalation via indirect parameters. Context-aware decisions: Access should be evaluated based on behavioural context and not just identity. Why is a session being initiated? What other systems has the user accessed? What's the broader pattern? Access should be evaluated based on behavioural context and not just identity. Why is a session being initiated? What other systems has the user accessed? What's the broader pattern? Segregation of duties: Different roles and accounts should be used for automation, deployment, and debugging. A single account with broad entitlements poses a massive risk if compromised. Different roles and accounts should be used for automation, deployment, and debugging. A single account with broad entitlements poses a massive risk if compromised. Real-time monitoring and forensics: PAM solutions must include session recording, keystroke logging, and audit trails to detect both deliberate abuse and accidental misuse. AI's double-edged sword Agentic AI represents both the future and the frontier of the confused deputy problem. These systems are capable of incredible operational gains, but their autonomous nature makes them ripe for exploitation. A prompt, parameter, or request that seems benign on the surface can trigger actions that cause significant harm or data leakage, especially if the agent can't distinguish between valid commands and malicious manipulation. This isn't just a technical flaw but a governance challenge. Enterprises must ensure that, as they embrace AI and automation, they do so with controls that prioritise intent verification, privilege minimization, and oversight. A strategic imperative The confused deputy problem is no longer a relic of early computing. It's a central challenge for modern digital security. As organisations deploy more intelligent and powerful tools, they must recognise that privilege without perspective is an attack vector in its own right. To prevent trusted systems from becoming dangerous liabilities, enterprises need to enforce least privilege not just as a policy, but as a design principle embedded in every layer of infrastructure, automation, and AI deployment.


NZ Herald
5 days ago
- NZ Herald
Refund money for 3G-only phone now, Consumer NZ says; Auckland Council says it's not responsible for Amazon's deserted construction site
Another hassle with a recently purchased phone that's only capable of calls on the soon-to-be-shuttered 3G networks; the council updates on Amazon's Quiet Earth Auckland build; an AWS exec jumps to the opposition; and the Government names an AI advisory panel. Another customer has found themselves stuck with a '4G'