Equinix, Inc. today announced the global expansion of Equinix Fabric Geo Zones, the first network-level, sovereignty enforcement layer that operates across interconnected clouds and providers. Enterprises face growing compliance risks from network rerouting events that can inadvertently move sovereign data across borders they are legally required to respect. Built natively into Equinix Fabric®, Geo Zones eliminates that risk by keeping data within defined geographic boundaries.
Most networks prioritize availability and performance over geographic or regulatory boundaries, often leaving customers with limited visibility or control over where their data travels. Fabric Geo Zones ensures that rerouted data remains within defined jurisdictions. This capability is especially critical for organizations operating in regulated industries.
Unlike solutions built within a single cloud or delivered as software overlays, Fabric Geo Zones enforces sovereignty at the network layer. Because it is enforced directly within the interconnection fabric itself, it delivers a level of control difficult for a single cloud or software overlay provider to match.
The expansion of Fabric Geo Zones is part of Equinix’s ongoing investment in reimagining networking for the AI era, following the launch of Fabric Intelligence and the Distributed AI Hub. Together, these capabilities provide customers with an adaptive, secure foundation for distributed AI and multicloud environments. Fabric Geo Zones is built on the Equinix Fabric industry-leading software-defined network spanning 77 metros worldwide, enabling customer-controlled data sovereignty at global scale. Reflecting the advanced compliance and control it delivers, Geo Zones is available at a premium tier—included in Unlimited Ports and Unlimited Ports Plus packages and priced at a premium to standard virtual circuits.
Fabric Geo Zones is built for workloads where compliance can’t be an afterthought. A European financial institution can run real‑time transactions across multiple clouds while ensuring customer data never leaves the EU, even when an outage triggers automatic rerouting across clouds. A healthcare organization can keep patient and AI inference data within defined jurisdictions across hybrid environments. A government agency can deploy sovereign AI with data confined to national or regional boundaries. A global company can automatically apply jurisdiction‑specific routing rules to meet GDPR, LGPD, APRA and other regional requirements across its operations.
Fabric Geo Zones enables customers to:
- Keep sensitive data within approved jurisdictions
- Reduce regulatory and jurisdictional risk from unintended cross-border routing
- Accelerate deployments using Fabric Super Agent
- Eliminate uncertainty during failover where outages reroute sensitive traffic
Fabric Geo Zones is available today in preview across Equinix’s global footprint, including Australia, Brazil, Canada, Japan, Switzerland, the U.K. and the U.S., with European Union availability to come in June. Equinix will be speaking about this at the International Telecoms Week conference panels on May 19: “The quest for sovereign AI meets the edge-cloud infrastructure battle“ and “Unleashing the 3 pillars of AI.”
Researchers warn AI cyber models have surpassed autonomous hacking benchmarks
Posted in Commentary with tags AI on May 15, 2026 by itnerdTwo independent studies found that advanced AI cybersecurity models, including Anthropic’s Claude Mythos Preview and OpenAI’s GPT-5.5, have exceeded previous benchmarks for autonomous cyberattack capability. Researchers from the UK AI Security Institute (AISI) and Palo Alto Networks said the models are now capable of chaining together complex multi-stage attack paths and identifying vulnerabilities at rates that significantly outpace earlier systems.
The UK AI Security Institute said Claude Mythos Preview and GPT-5.5 became the first models to fully complete a simulated enterprise intrusion scenario without human intervention. According to the findings, the models successfully executed tasks including credential theft, privilege escalation, lateral movement, persistence, and protected system access during controlled testing. Researchers said the models consistently outperformed previous-generation systems on autonomous cyber capability benchmarks designed to measure real-world offensive potential.
Separately, Palo Alto Networks said its internal testing showed advanced AI cyber models increased vulnerability discovery rates by more than seven times compared to traditional manual research workflows. Researchers said the models were particularly effective at identifying exploitable weaknesses in enterprise software, cloud configurations, and authentication systems, raising concerns that AI-assisted vulnerability discovery could dramatically accelerate exploit development timelines for both defenders and threat actors.
Josh Marpet, Senior Product Security Consultant, Finite State:
“Unfortunately, this is about as surprising as saying that the sun rises. Nobody was not expecting it. The question is not, can an AI find and run an exploit? We know they can. The question is, can an AI find vulnerable code in a device or application with very little instruction given, write or find the exploit for that vulnerability, and successfully prosecute the exploit through to completion? If the answer is yes, then we are having a bad day.
“The one interesting item is that the quality of the exploits, the discovery, the entire process, is still fairly dependent on the caliber of the person sitting behind the keyboard and directing that AI. For now.
Damon Small, Board of Directors, Xcape, Inc.:
“The emergence of GPT-5.5 and Claude Mythos marks a paradigm shift where autonomous attack-path chaining moves from a theoretical lab risk to a quantifiable operational reality. When an AI can compress a twelve-hour expert reverse-engineering task into ten minutes for less than two dollars, the traditional economics of cyber defense collapse. This capability will inevitably commoditize the high-margin, bespoke manual testing currently sold by security consultancies, forcing a market pivot toward high-level strategy and remediation.
“While these models currently demonstrate low reliability, succeeding in only 20% to 30% of end-to-end attempts, that failure rate is irrelevant to a persistent attacker with near-zero marginal costs. Security leaders must move beyond patching individual vulnerabilities and focus on time-to-break-chain, assuming attackers will use these models to identify and exploit multi-stage paths at machine speed. The priority is no longer just preventing the initial foothold, but ensuring that every compromised node is a dead end through aggressive segmentation and just-in-time access.
“If your security posture relies on a $500-an-hour consultant to find the “bespoke” vulnerabilities that a $20-a-month chatbot just discovered in bulk, you aren’t paying for security; you are paying for an expensive PDF.”
Jacob Krell, Senior Director: Secure AI Solutions & Cybersecurity, Suzu Labs:
“Palo Alto’s advisory data puts real operational weight behind the AISI benchmarks. Going from fewer than five CVEs per month to 26 in a single advisory cycle, with the majority found by AI scanning, is a preview of what every software vendor will face once these models are widely deployed. The bottleneck has shifted from discovery to remediation, and most organizations are not built to patch at the rate AI finds vulnerabilities.
“Palo Alto estimates a three to five month window before AI driven exploits become the norm. That window is the planning figure security leaders should be working against. This capability is the new baseline, and because different models surface different vulnerability classes, the total volume of findings will only grow as more models reach this tier. Organizations running vulnerability management programs built for five CVEs a month need to start planning for a world where that number is measured in dozens.”
Tom Yates, Product SME, Ridge Security Technology Inc.:
“These findings highlight the urgent and critical need for security companies to be at the leading edge of Gen AI technology. Security tooling must match the capabilities hackers use or your infrastructure will look like swiss cheese to the bad guys. But security buyers need to beware, an avalanche of AI-washing has already hit the market. Buyers must spend more time digging into product claims to ensure that AI is a first-class citizen of the solution, not a “bolt-on” to satisfy marketing needs.”
This is another example of AI welcoming us to the new reality of cybersecurity. Were the time to get pwned has been reduced so much that humans are simply not even in the game. That should scare anyone on that side of the fence.
Leave a comment »