Astrix Security named a Cool Vendor in the 2023 Gartner Cool Vendors in...
[New York, September, 11, 2023] – Astrix Security, the enterprise’s trusted solution for securing non-human identities, was named a Cool Vendor by Gartner in the research firm’s 2023 Cool Vendors in...
View ArticleTop 5 non-human access attacks of 2023
2024 is here, and before we delve into new year resolutions and looking to the future, we wanted to take a moment and look back at some of the most high profile non-human access attacks in 2023, rank...
View ArticlePart 1: Non-human identity security – The complete technical guide
“Identity is the new perimeter.” This catch phrase is present in almost every website of identity security vendors, and for a good reason. Human access, more commonly referred to as user access, is an...
View ArticlePart 2: How attackers exploit OAuth: A deep dive
“Identity is the new perimeter.” This catch phrase is present in almost every website of identity security vendors, and for a good reason. Human access, more commonly referred to as user access, is an...
View ArticleOAuth attack against Microsoft by Midnight Blizzard
Once again, non-human access manifests as a significant blindspot in organizations’ identity layer. Midnight Blizzard, the Russian state-sponsored actors, were abusing OAuth applications as part of...
View ArticleBreach analysis: Cloudflare falls victim to Okta attack
In a not-so-surprising turn of events, one of the victims in Okta’s supply chain attack reveals further exploits. Cloudflare recently reported that their entire Atlassian suite – Bitbucket, Jira and...
View ArticlePart 3: The anatomy of supply chain attacks: Non-human identities & TPRM failure
“Identity is the new perimeter.” This catch phrase is present in almost every website of identity security vendors, and for a good reason. Human access, more commonly referred to as user access, is an...
View ArticleAstrix integrates with Slack
Astrix is now available on the Slack App Directory and enables enterprises to secure non-human identities in Slack environments leveraging AI detection capabilities. In addition, Astrix offers deeper...
View ArticleHow attackers exploit non-human identities: Workshop recap
“Identity is the new perimeter.” This catch phrase is present in almost every website of identity security vendors, and for a good reason. Human access, more commonly referred to as user access, is an...
View ArticleWhat are non-human identities?
Non-human identities (NHI) are digital, automated and programmable access credentials that play a crucial role in securing systems, managing access, and ensuring the integrity of digital environments....
View Article