NHI Security Hub

The latest on non-human identity risks, best practices, research insights, Astrix platform updates, and more…

CSA and Astrix Research: The State of Non-Human Identity Security

CSA and Astrix Research: The State of Non-Human Identity Security

Massive NHI attack: 230 Million cloud environments were compromised

Massive NHI attack: 230 Million cloud environments were compromised

Format
Topic
Automotive Technology Provider Secures NHIs with Astrix Security

Automotive Technology Provider Secures NHIs with Astrix Security

Boomi Controls 3rd-Party NHI Access With Astrix

Boomi Controls 3rd-Party NHI Access With Astrix

Pagaya Gains Visibility & Governance Over NHIs With Astrix

Pagaya Gains Visibility & Governance Over NHIs With Astrix

Story 4: Detecting compromised secrets & careless 3rd-party vendors

Story 4: Detecting compromised secrets & careless 3rd-party vendors

Story 3: Catching the Red-Team Red-Handed

Story 3: Catching the Red-Team Red-Handed

Story 2: Reducing new risk by 97% – The automation of security awareness

Story 2: Reducing new risk by 97% – The automation of security awareness

Story 1: Removing super-admin tokens across 33 GitHub tenants in 2 hours

Story 1: Removing super-admin tokens across 33 GitHub tenants in 2 hours

1