Introducing the OWASP NHI Top 10: Standardizing Non-Human Identity Security
The latest on non-human identity risks, best practices, research insights, Astrix platform updates, and more…
The Service Accounts Guide Part 2: Challenges, Compliance and Best Practices
The Service Accounts Guide Part 1: Origin, Types, Pitfalls and Fixes
CSA and Astrix Research: The State of Non-Human Identity Security
Massive NHI attack: 230 Million cloud environments were compromised
App-Specific Passwords: Origins, Functionality, Security Risks and Mitigation
Astrix Discovers 0-Day Vulnerability in Google Cloud Platform
GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts