NHI Security Hub

The latest on non-human identity risks, best practices, research insights, Astrix platform updates, and more…

CSA and Astrix Research: The State of Non-Human Identity Security

CSA and Astrix Research: The State of Non-Human Identity Security

Massive NHI attack: 230 Million cloud environments were compromised

Massive NHI attack: 230 Million cloud environments were compromised

Format
Topic
Part 3: The anatomy of supply chain attacks: Non-human identities & TPRM failure

Part 3: The anatomy of supply chain attacks: Non-human identities & TPRM failure

Breach analysis: Cloudflare falls victim to Okta attack

Breach analysis: Cloudflare falls victim to Okta attack

OAuth attack against Microsoft by Midnight Blizzard

OAuth attack against Microsoft by Midnight Blizzard

Part 2: How attackers exploit OAuth: A deep dive

Part 2: How attackers exploit OAuth: A deep dive

Part 1: Non-human identity security – The complete technical guide

Part 1: Non-human identity security – The complete technical guide

Top 5 non-human identity attacks of 2023

Top 5 non-human identity attacks of 2023

How to Close the Service Account Security Gap in GCP and Snowflake

How to Close the Service Account Security Gap in GCP and Snowflake

Insecure third-party connections to your GitHub may trigger a supply chain attack

Insecure third-party connections to your GitHub may trigger a supply chain attack