The Hacker NewsFeb 02, 2026Threat Detection / Endpoint Security For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative […]
Category: Securing
Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work
The browser has become the main interface to GenAI for most enterprises: from web-based LLMs and copilots, to GenAI‑powered extensions […]
Securing the Open Android Ecosystem with Samsung Knox
Nov 05, 2025The Hacker NewsMobile Security / Enterprise IT Raise your hand if you’ve heard the myth, “Android isn’t secure.” […]
Securing AI to Benefit from AI
Artificial intelligence (AI) holds tremendous promise for improving cyber defense and making the lives of security practitioners easier. It can […]
Securing the Agentic Era: Introducing Astrix’s AI Agent Control Plane
Sep 16, 2025The Hacker NewsAI Security / Enterprise Security AI agents are rapidly becoming a core part of the enterprise, […]
Securing Agentic AI: How to Protect the Invisible Identity Access
Jul 15, 2025The Hacker NewsAutomation / Risk Management AI agents promise to automate everything from financial reconciliations to incident response. […]
Securing Data in the AI Era
Jul 11, 2025The Hacker NewsData Security / Enterprise Security The 2025 Data Risk Report: Enterprises face potentially serious data loss […]
Securing CI/CD workflows with Wazuh
Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to practices that automate how code is developed and released to different environments. […]
