On February 14, 2026, identity and payment security provider Entrust and technology leader Google announced a strategic partnership to innovate in the field of identity verification. This collaboration will focus on integrating their respective technologies to create solutions powered by Artificial Intelligence (AI). The primary goal is to build more resilient defenses against a new generation of sophisticated, AI-driven fraud and identity attacks. The partnership also aims to improve the user experience during onboarding, balancing robust security with operational efficiency. This move signals a significant industry trend where AI is being leveraged not just by attackers, but as a critical component of modern defense strategies.
The collaboration between Entrust and Google is designed to create an integrated solution that helps organizations strengthen their security posture. While specific product details were not announced, the partnership will likely involve:
This partnership is a direct response to the evolving threat landscape where malicious actors are increasingly using AI to scale and enhance their attacks. These AI-powered threats include:
By using AI for defense, Entrust and Google aim to create systems that can detect and adapt to these novel threats in real-time, moving beyond static, rule-based security.
This partnership will have a significant impact on the Identity and Access Management (IAM) market.
Organizations can prepare to leverage these future technologies by focusing on the following strategic areas:
The partnership aims to enhance identity verification, a core component of modern MFA systems.
AI-driven security relies on behavioral analysis to detect anomalies indicative of fraud or compromise.
Entrust and Google announce a strategic partnership.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.