Listen to the article
The European Commission launches a new initiative to foster open-source digital ecosystems, while CrowdStrike and Seraphic Security integrate advanced browser protection to combat session-based cyber threats, signalling a new focus on local control and innovative security measures.
Europe is pressing to shape more of its own digital infrastructure rather than depend heavily on non‑EU cloud providers. According to Computerworld, the European Commission has launched an initiative called Towards European Open Digital Ecosystems to stimulate growth in open‑source work across cloud, artificial intelligence, cybersecurity and even open hardware, with the stated aim of strengthening resilience and local control of key digital stacks. [2]
In the private sector, CrowdStrike has announced plans to buy Seraphic Security, a specialist in browser runtime protection, as part of a push to extend Falcon beyond traditional endpoints into session‑level defence. The company said the deal will enable Falcon to ingest Seraphic’s browser‑native telemetry and combine it with CrowdStrike’s endpoint signals and threat intelligence to support a unified next‑generation identity and access approach; the acquisition is expected to complete in the coming months. According to Computerworld, this move targets threats that evade visibility inside browser sessions. [3],[2]
Seraphic has also confirmed tighter commercial integration with CrowdStrike’s ecosystem: its Secure Enterprise Browser is now listed in the CrowdStrike Marketplace and can be purchased and deployed alongside Falcon, with integrations that correlate browser‑layer telemetry with Falcon’s analytics and Next‑Gen SIEM capabilities. Seraphic and associated press releases describe the arrangement as enabling customers to discover, buy and implement browser‑native protection directly through the Falcon platform to improve real‑time detection and response. [4],[7],[5],[6]
Security vendors caution that browsers have become prime vectors because many SaaS and AI tools operate inside encrypted sessions where conventional controls can miss malicious activity. Computerworld notes techniques that begin with a pre‑filled prompt in a URL and then use follow‑up requests to siphon sensitive data in small increments; Microsoft has said it patched the specific issue, but recommends treating links and pre‑filled prompts as untrusted. The combined endpoint‑to‑browser telemetry approach CrowdStrike and Seraphic describe aims to address risks such as malicious extensions, shadow IT and risky data sharing by enabling session‑aware enforcement and dynamic, continuous authorisation. [2],[3]
Source Reference Map
Inspired by headline at: [1]
Sources by paragraph:
Source: Fuse Wire Services


