NHI Security Hub

The latest on non-human identity risks, best practices, research insights, Astrix platform updates, and more…

CSA and Astrix Research: The State of Non-Human Identity Security

CSA and Astrix Research: The State of Non-Human Identity Security

Massive NHI attack: 230 Million cloud environments were compromised

Massive NHI attack: 230 Million cloud environments were compromised

Format
Topic
2022 Recap: 6 Surprising Third-Party Connectivity Stats 

2022 Recap: 6 Surprising Third-Party Connectivity Stats 

Dark Reading – The Next Generation of Supply Chain Attacks is Here to Stay

Dark Reading – The Next Generation of Supply Chain Attacks is Here to Stay

20 Minute Leaders: Leadership & the Future of App-to-App Security

20 Minute Leaders: Leadership & the Future of App-to-App Security

DrZeroTrust: Securing App-to-App Connectivity and Low or No Code Apps

DrZeroTrust: Securing App-to-App Connectivity and Low or No Code Apps

Astrix on a CISO Series Episode: Hacking Third-Party Integrations

Astrix on a CISO Series Episode: Hacking Third-Party Integrations

GitHub Apps Bug Created Significant 3rd-Party Risk: How You Can Stay Protected

GitHub Apps Bug Created Significant 3rd-Party Risk: How You Can Stay Protected

PLG and security leaders: going with the flow

PLG and security leaders: going with the flow

The promise and peril of third-party integrations

The promise and peril of third-party integrations