NHI Security Hub | Learn

The latest on non-human identity risks, best practices, research insights, Astrix platform updates, and more…

Introducing the OWASP NHI Top 10: Standardizing Non-Human Identity Security

Introducing the OWASP NHI Top 10: Standardizing Non-Human Identity Security

Securing NHIs in Jira and Confluence

Securing NHIs in Jira and Confluence

Format
Topic
Massive NHI attack: 230 Million cloud environments were compromised

Massive NHI attack: 230 Million cloud environments were compromised

NHI attacks making waves: Insights on latest 5 incidents

NHI attacks making waves: Insights on latest 5 incidents

13 non-human identity attacks in 16 months

13 non-human identity attacks in 16 months

Breach analysis: Cloudflare falls victim to Okta attack

Breach analysis: Cloudflare falls victim to Okta attack

OAuth attack against Microsoft by Midnight Blizzard

OAuth attack against Microsoft by Midnight Blizzard

Top 5 non-human identity attacks of 2023

Top 5 non-human identity attacks of 2023

Sumo Logic: Compromised non-human identity leads to potential supply-chain exploits

Sumo Logic: Compromised non-human identity leads to potential supply-chain exploits

The Okta breach: The results of a leaked service account

The Okta breach: The results of a leaked service account

1 2
Next