NHI Security Hub

The latest on non-human identity risks, best practices, research insights, Astrix platform updates, and more…

CSA and Astrix Research: The State of Non-Human Identity Security

CSA and Astrix Research: The State of Non-Human Identity Security

Massive NHI attack: 230 Million cloud environments were compromised

Massive NHI attack: 230 Million cloud environments were compromised

Format
Topic
Securing non-human identities in AWS environments (and beyond)

Securing non-human identities in AWS environments (and beyond)

Insecure third-party connections to your GitHub may trigger a supply chain attack

Insecure third-party connections to your GitHub may trigger a supply chain attack

How to Close the Service Account Security Gap in GCP and Snowflake

How to Close the Service Account Security Gap in GCP and Snowflake

Not just code vulnerabilities: The overlooked cause of software supply chain attacks

Not just code vulnerabilities: The overlooked cause of software supply chain attacks

1