Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cisco Acquires Astrix to Bolster AI Identity Security

Cisco Acquires Astrix to Bolster AI Identity Security

Posted on May 5, 2026 By CWS

Cisco Systems has announced its acquisition of Astrix Security Ltd., a leading company in Non-Human Identity (NHI) security. This move is aimed at enhancing Cisco’s defense mechanisms against the rising threats associated with AI agents in enterprise settings.

The Importance of Securing AI Agents

The modern workplace is rapidly evolving with the introduction of ‘agentic AI’—automated agents capable of operating at machine speed to handle data, make decisions, and execute tasks. Although these AI agents significantly boost productivity, they also pose substantial security risks if not properly monitored.

AI agents operate using non-human identities, such as API keys, service accounts, and OAuth tokens. Compromising these credentials can lead to large-scale malicious activities. Cisco’s recent AI Readiness Index highlights that only 24% of organizations have adequate measures in place to manage AI agent activities safely.

How Astrix Enhances Cisco’s Capabilities

Astrix Security has spent five years developing expertise in safeguarding the credentials that support machine-to-machine interactions. This acquisition provides Cisco with advanced capabilities to identify, track, and secure AI agents and non-human identities throughout an organization.

With Astrix’s integration, Cisco will enhance its security offerings through discovery and governance, lifecycle management, threat detection and response, and secrets management. These capabilities allow security teams to oversee AI agent activity, manage their lifecycle, detect and block unauthorized actions, and protect sensitive credentials across cloud environments.

Expanding Cisco’s Zero Trust Strategy

Cisco plans to incorporate Astrix’s technologies into its Cisco Identity Intelligence suite, thereby improving context and visibility across its security platform. This will extend into Cisco Secure Access and Duo Identity and Access Management, enabling organizations to authenticate and authorize non-human identities under a Zero Trust model.

By integrating this intelligence with tools like Splunk, security operations centers can gain a comprehensive view of agent behavior, facilitating real-time threat investigation. This acquisition aligns with Cisco’s broader strategy to fortify the security of AI-driven environments.

Overall, the addition of Astrix’s technology represents a significant advancement in Cisco’s efforts to secure automation at scale. It complements recent projects like Project Glasswing and acquisitions such as Galileo, collectively advancing Cisco’s position in the cybersecurity landscape.

Stay updated on cybersecurity developments by following us on Google News, LinkedIn, and X. For inquiries or to feature your stories, feel free to contact us.

Cyber Security News Tags:AI, AI agents, AI threats, Astrix Security, Cisco, cloud security, credential management, Cybersecurity, data protection, enterprise security, non-human identity, security acquisition, security strategy, technology news, Zero Trust

Post navigation

Previous Post: Apache HTTP/2 Vulnerability Exposes Systems to RCE and DoS
Next Post: Malware Compromises DAEMON Tools in Supply Chain Attack

Related Posts

Microsoft Confirms Recent Windows 11 24H2 Security Update Not Causing SSD/HDD Failures Microsoft Confirms Recent Windows 11 24H2 Security Update Not Causing SSD/HDD Failures Cyber Security News
Threat Actors Weaponize ChatGPT and Grok Conversations to Deploy AMOS Stealer Threat Actors Weaponize ChatGPT and Grok Conversations to Deploy AMOS Stealer Cyber Security News
Jaguar Land Rover Confirms Employee Data Stolen in August Cyberattack Jaguar Land Rover Confirms Employee Data Stolen in August Cyberattack Cyber Security News
Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access Cyber Security News
SoundCloud Confirms Data Breach Following VPN and Access Issues SoundCloud Confirms Data Breach Following VPN and Access Issues Cyber Security News
Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerabilities in Qualcomm Chipsets Risk Remote Exploits
  • Weaver E-cology RCE Flaw Under Active Exploitation
  • Enhance SOC Efficiency with Strategic Threat Intelligence
  • Malware Compromises DAEMON Tools in Supply Chain Attack
  • Cisco Acquires Astrix to Bolster AI Identity Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerabilities in Qualcomm Chipsets Risk Remote Exploits
  • Weaver E-cology RCE Flaw Under Active Exploitation
  • Enhance SOC Efficiency with Strategic Threat Intelligence
  • Malware Compromises DAEMON Tools in Supply Chain Attack
  • Cisco Acquires Astrix to Bolster AI Identity Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark