NHI Security Hub | Learn

The latest on non-human identity risks, best practices, research insights, Astrix platform updates, and more…

Introducing the OWASP NHI Top 10: Standardizing Non-Human Identity Security

Introducing the OWASP NHI Top 10: Standardizing Non-Human Identity Security

Securing NHIs in Jira and Confluence

Securing NHIs in Jira and Confluence

Format
Topic
The Service Accounts Guide Part 2: Challenges, Compliance and Best Practices

The Service Accounts Guide Part 2: Challenges, Compliance and Best Practices

The Service Accounts Guide Part 1: Origin, Types, Pitfalls and Fixes

The Service Accounts Guide Part 1: Origin, Types, Pitfalls and Fixes

CSA and Astrix Research: The State of Non-Human Identity Security

CSA and Astrix Research: The State of Non-Human Identity Security

The State of Non-Human Identity Security

The State of Non-Human Identity Security

Massive NHI attack: 230 Million cloud environments were compromised

Massive NHI attack: 230 Million cloud environments were compromised

App-Specific Passwords: Origins, Functionality, Security Risks and Mitigation

App-Specific Passwords: Origins, Functionality, Security Risks and Mitigation

Astrix Discovers 0-Day Vulnerability in Google Cloud Platform

Astrix Discovers 0-Day Vulnerability in Google Cloud Platform

GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts

GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts

1 2
Next