Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Optimize SOC Costs & Boost Confidence with Better Threat Intelligence
May 5, 2026
GnuTLS 3.8.13 Released with Fix for 12 Vulnerabilities Affecting
May 5, 2026
Critical Qualcomm Chipset Flaws Enable Remote Code Execution
May 5, 2026
Home/CyberSecurity News/Cisco Acquires Astrix Security to Boost Strengthen Agent
CyberSecurity News

Cisco Acquires Astrix Security to Boost Strengthen Agent

Cisco has announced its intent to acquire Astrix Security Ltd., an industry leader specializing in Non-Human Identity (NHI) security. This strategic acquisition aims to protect enterprise...

Jennifer sherman
Jennifer sherman
May 5, 2026 2 Min Read
0 0

Cisco has announced its intent to acquire Astrix Security Ltd., an industry leader specializing in Non-Human Identity (NHI) security.

This strategic acquisition aims to protect enterprise environments from the expanding attack surface created by the rapid deployment of AI agents.

The modern workplace is undergoing a massive shift. Employees are increasingly supported by “agentic AI” automated AI agents that work at machine speed to access data, make decisions, and execute tasks.

While these agents unlock incredible productivity, they also introduce severe security vulnerabilities if left unmonitored.

Cisco to Acquire Astrix Security

Unlike human users, AI agents rely on non-human identities to connect to enterprise systems.

These identities include API keys, service accounts, and OAuth tokens. If threat actors compromise these credentials, they can execute malicious actions at scale.

According to Cisco’s AI Readiness Index, only 24% of organizations currently have the guardrails needed to control AI agent actions safely.

Furthermore, emerging AI-driven threats, such as the Mythos model, are forcing security teams to confront high-impact, accelerated cyber attacks.

Astrix Security has spent the last five years specializing in protecting credentials that power machine-to-machine interactions.

By acquiring Astrix, Cisco gains deep technical capabilities to discover, monitor, and secure every AI agent and NHI across an organization.

The integration of Astrix will bring four core capabilities to Cisco’s security portfolio:

  • Discovery and governance: Security teams can map all AI agent activity, resolve hygiene issues, and prevent compliance violations.
  • Lifecycle management: Administrators can easily manage AI agents from initial provisioning through final decommissioning.
  • Threat detection and response: The platform automatically detects compromised credentials and blocks out-of-scope agent actions.
  • Secrets management: Organizations gain centralized protection for sensitive keys and tokens across cloud environments and vaults.

Upgrading Cisco Zero Trust

Cisco plans to integrate Astrix’s technology into Cisco Identity Intelligence, enhancing context and visibility across its entire security platform.

These new NHI features will also extend into Cisco Secure Access and Duo Identity and Access Management.

This allows companies to authenticate and authorize non-human identities under a strict Zero Trust model, treating AI agents with the same security scrutiny as human employees.

By feeding this intelligence into Splunk or other SIEM tools, security operations centers (SOCs) get a unified view of agent behavior to investigate threats in real time.

This acquisition is a critical step in Cisco’s broader strategy to secure the AI era.

It builds on recent infrastructure upgrades such as Project Glasswing, Live Protect, and the Galileo acquisition.

By locking down the non-human credentials that AI agents abuse, Cisco is helping organizations adopt automation securely and at scale.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

China-Aligned SHADOW-EARTH-053 Exploits Exchange Servers to Deploy

Next Post

Critical Weaver E-cology RCE Actively Exploited Vulnerability Attacks

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
China-Aligned SHADOW-EARTH-053 Exploits Exchange Servers to Deploy
May 5, 2026
ScarCruft Supply Chain Attack Hits Gaming with Platform Windows
May 5, 2026
Silver Fox Deploys ValleyRAT & ABCDoor Via Fake Uses Notices
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us