Curity looks to reinvent IAM with runtime authorization for AI agents

In 2026, enterprise developers are building and deploying the first generation of powerful, increasingly autonomous AI agents at incredible speed. Now comes the hard part: working out how to secure them. Vendors in the space are facing multiple challenges. To begin with, traditional identity and access management (IAM) tools were never designed to secure anything…

Read More

AI-Native Assistants Have Arrived—But Earning Trust Is the True Innovation

Artificial intelligence has dazzled us with conversation. The real revolution is underway, one where AI doesn’t just talk, but acts. Across large organizations, a new class of AI-native assistants is quietly reshaping workflows. These systems go beyond chat; they take action. They process claims, open support tickets, reroute supply chains, and even draft contracts, all…

Read More

13 new critical holes in JavaScript sandbox allow execution of arbitrary code

Thirteen critical vulnerabilities have been found in the vm2 JavaScript sandbox package that could allow an attacker’s code to escape the container and do nasty things to IT environments. As a result, developers using this library in their applications are urged to update the software to the latest version, which is currently 3.11.2. The warnings…

Read More

Capacity markets could reshape cloud computing

An article from AI CERTs reporting on the Anthropic-SpaceX capacity arrangement caught my attention because it highlights a possibility the cloud market has been moving toward for years but has never fully embraced. The traditional assumption has always been simple: If you need elastic infrastructure at scale, you go to a hyperscaler such as AWS, Microsoft,…

Read More