NHI Security Hub

The latest on non-human identity risks, best practices, research insights, Astrix platform updates, and more…

CSA and Astrix Research: The State of Non-Human Identity Security

CSA and Astrix Research: The State of Non-Human Identity Security

Massive NHI attack: 230 Million cloud environments were compromised

Massive NHI attack: 230 Million cloud environments were compromised

Format
Topic
Securing non-human identities in Salesforce

Securing non-human identities in Salesforce

Securing non-human identities in Google Workspace

Securing non-human identities in Google Workspace

Security Magazine – Non-human identities: Secure them now, not later

Security Magazine – Non-human identities: Secure them now, not later

Forbes – Shadow Connections: How They’re Impacting Your Production Environment And Software Supply Chain Security

Forbes – Shadow Connections: How They’re Impacting Your Production Environment And Software Supply Chain Security

GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts

GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts

The CircleCI breach: The results of a stolen access token

The CircleCI breach: The results of a stolen access token

Slack’s GitHub breach: 6 tips to avoid similar attacks

Slack’s GitHub breach: 6 tips to avoid similar attacks

CircleCI Security Alert – Are You at Risk?

CircleCI Security Alert – Are You at Risk?