NHI Security Hub

The latest on non-human identity risks, best practices, research insights, Astrix platform updates, and more…

CSA and Astrix Research: The State of Non-Human Identity Security

CSA and Astrix Research: The State of Non-Human Identity Security

Massive NHI attack: 230 Million cloud environments were compromised

Massive NHI attack: 230 Million cloud environments were compromised

Format
Topic
From Radio Shack to the Fortune 500 And now Astrix : My Cybersecurity Journey

From Radio Shack to the Fortune 500 And now Astrix : My Cybersecurity Journey

Top 4 use cases of non-human identity security: Live event recap

Top 4 use cases of non-human identity security: Live event recap

The White House mentions Astrix as one of innovators for AI security Executive Order

The White House mentions Astrix as one of innovators for AI security Executive Order

Looking Back at Our Journey in the 2023 RSA Innovation Sandbox Contest

Looking Back at Our Journey in the 2023 RSA Innovation Sandbox Contest

Astrix Security Raises $25M in Series A Funding

Astrix Security Raises $25M in Series A Funding

Security Magazine – Non-human identities: Secure them now, not later

Security Magazine – Non-human identities: Secure them now, not later

Forbes – Shadow Connections: How They’re Impacting Your Production Environment And Software Supply Chain Security

Forbes – Shadow Connections: How They’re Impacting Your Production Environment And Software Supply Chain Security

Security Boulevard – Supply Chain Dependency: What Your GitHub Connections May Trigger

Security Boulevard – Supply Chain Dependency: What Your GitHub Connections May Trigger

1 2 3
Next