Topic: least privilege
-
Hush Security Launches to Replace Legacy Vaults with Secretless Access
Hush Security has raised $11 million in seed funding to advance its policy-driven, just-in-time access model for machine-to-machine communication, replacing traditional vaults and static secrets. The company's approach provides real-time visibility, posture analysis, and prevention, addressing th...
Read More » -
Astrix AI Agents: Secure Compliance Risk Management for Enterprises
Astrix Security has launched the AI Agent Control Plane (ACP) to help enterprises safely deploy and manage AI agents by providing short-lived, scoped credentials and just-in-time access based on least privilege principles. The platform addresses rising agent-related threats, with studies showing ...
Read More » -
Xage Fabric: Secure Your Data from Unauthorized Access
Businesses face significant security challenges when adopting AI, including data breaches and unauthorized access, which traditional measures often fail to address effectively. Xage Security has introduced a zero trust platform designed specifically for AI environments, offering identity-centric,...
Read More » -
Control Agentic AI with Intent-Based Permissions
Identity and access management must evolve from action-based permissions to intent-based permissions to handle autonomous AI agents, which require understanding the purpose behind actions, not just the actions themselves. Action-based permissions are limited for AI because they only control what ...
Read More »