Cyber Security News

Google Cloud Donates A2A Protocol to Linux Foundation Enables Secure, Intelligent Communication

Google Cloud has transferred its groundbreaking Agent2Agent (A2A) protocol to the Linux Foundation, marking a pivotal moment in artificial intelligence interoperability. 

The announcement, made at Open Source Summit North America on June 23, 2025, establishes a new collaborative framework for AI agents to communicate securely across diverse platforms and systems. 

This strategic move positions the A2A protocol as a vendor-neutral standard under the trusted governance of the Linux Foundation, ensuring long-term sustainability and community-driven development.

Summary
1. Google Cloud transferred its Agent2Agent protocol to the Linux Foundation on June 23, 2025, for neutral governance.
2. Seven major companies, including AWS, Microsoft, Cisco, and Salesforce, joined as founding members, with 100+ companies supporting the protocol.
3. The A2A protocol allows AI agents from different platforms to communicate securely and coordinate tasks across systems.
4. The initiative prevents vendor lock-in and accelerates innovation by creating an open ecosystem for collaborative AI applications.

The formation of the Agent2Agent project brings together technology giants, including Amazon Web Services, Cisco, Google, Microsoft, Salesforce, SAP, and ServiceNow as founding members. 

This unprecedented collaboration aims to foster an open and interoperable ecosystem for AI agents, with more than 100 companies now supporting the protocol specification. 

AWS VP Swami Sivasubramanian emphasized that “agentic AI will be critical to nearly any customer experience,” while Cisco’s Vijoy Pandey highlighted their integration of A2A support directly into key AGNTCY open source components including Directory, Identity, SLIM Messaging, and Observability frameworks.

The protocol addresses the growing need for agents to operate in dynamic, multi-agent environments, coordinating actions across a wide array of applications and data infrastructure. 

Technical Capabilities and Interoperability Standards

The A2A protocol serves as an open standard for communication and collaboration between distinct AI agents, providing a common language for autonomous systems to discover each other’s capabilities and securely exchange information. 

The technical architecture enables agents to coordinate complex tasks across traditionally disconnected systems, breaking down silos that currently limit artificial intelligence potential. 

Google’s transfer includes the complete protocol specification, accompanying Software Development Kits (SDKs), and comprehensive developer tooling to accelerate adoption.

The protocol’s design emphasizes extensibility, security, and real-world usability across industries, enabling developers to build agents that seamlessly interoperate regardless of platform, vendor, or framework. 

Linux Foundation Executive Director Jim Zemlin stated that A2A’s integration “will unlock the next era of agent-to-agent powered productivity” through neutral governance and collaborative development. 

The project invites organizations and individuals to contribute to the growing ecosystem, with development activities hosted on the Agent2Agent project GitHub repository. 

Google Cloud continues working with partners toward broader open standards complementing the A2A protocol, including trustworthy agent identity, delegated agent authority, governance policy, and agent security frameworks.

This initiative represents a fundamental shift toward community-driven development as the fastest path to widespread agent-to-agent adoption, ensuring universal compatibility and accelerating innovative AI applications across enterprise environments.

Live Credential Theft Attack Unmask & Instant Defense – Free Webinar

Kaaviya

Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Recent Posts

Microsoft DNS Outage Disrupts Azure and Microsoft 365 Services Worldwide

Microsoft reported a DNS-related outage on October 29, 2025, affecting access to key services, including…

8 minutes ago

New TEE.fail Attack Breaks Trusted Environments to Exfiltrate Secrets from Intel and AMD DDR5 Environments

A groundbreaking security vulnerability has emerged that fundamentally challenges the integrity of modern trusted execution…

49 minutes ago

Sweet Security Brings Runtime-CNAPP Power to Windows

Tel Aviv, Israel, October 29th, 2025, CyberNewsWire Sweet Security Brings Runtime-CNAPP Power to Windows Sweet…

54 minutes ago

AWS US-EAST-1 Region Experiences Delays in EC2 Instance Deployments

Amazon Web Services encountered significant operational challenges in its US-EAST-1 region on October 28, 2025,…

1 hour ago

WordPress Plugin Vulnerability Exposes 7 Million Sites to XSS Attack

A critical cross-site scripting (XSS) vulnerability has been discovered in the popular LiteSpeed Cache plugin…

1 hour ago

Hikvision Exploiter – An Automated Exploitation Toolkit Targeting Hikvision IP Cameras

A new open-source tool called HikvisionExploiter has emerged, designed to automate attacks on vulnerable Hikvision…

2 hours ago