Quantcast
Channel: Astrix Security
Browsing latest articles
Browse All 19 View Live

Astrix Security named a Cool Vendor in the 2023 Gartner Cool Vendors in...

[New York, September, 11, 2023] – Astrix Security, the enterprise’s trusted solution for securing non-human identities, was named a Cool Vendor by Gartner in the research firm’s 2023 Cool Vendors in...

View Article



Top 5 non-human access attacks of 2023

2024 is here, and before we delve into new year resolutions and looking to the future, we wanted to take a moment and look back at some of the most high profile non-human access attacks in 2023, rank...

View Article

Image may be NSFW.
Clik here to view.

Part 1: Non-human identity security – The complete technical guide

“Identity is the new perimeter.” This catch phrase is present in almost every website of identity security vendors, and for a good reason. Human access, more commonly referred to as user access, is an...

View Article

Image may be NSFW.
Clik here to view.

Part 2: How attackers exploit OAuth: A deep dive

“Identity is the new perimeter.” This catch phrase is present in almost every website of identity security vendors, and for a good reason. Human access, more commonly referred to as user access, is an...

View Article

Image may be NSFW.
Clik here to view.

OAuth attack against Microsoft by Midnight Blizzard

Once again, non-human access manifests as a significant blindspot in organizations’ identity layer. Midnight Blizzard, the Russian state-sponsored actors, were abusing OAuth applications as part of...

View Article


Image may be NSFW.
Clik here to view.

Breach analysis: Cloudflare falls victim to Okta attack

In a not-so-surprising turn of events, one of the victims in Okta’s supply chain attack reveals further exploits. Cloudflare recently reported that their entire Atlassian suite – Bitbucket, Jira and...

View Article

Image may be NSFW.
Clik here to view.

Part 3: The anatomy of supply chain attacks: Non-human identities & TPRM failure

“Identity is the new perimeter.” This catch phrase is present in almost every website of identity security vendors, and for a good reason. Human access, more commonly referred to as user access, is an...

View Article

Image may be NSFW.
Clik here to view.

Astrix integrates with Slack

Astrix is now available on the Slack App Directory and enables enterprises to secure non-human identities in Slack environments leveraging AI detection capabilities. In addition, Astrix offers deeper...

View Article


Image may be NSFW.
Clik here to view.

How attackers exploit non-human identities: Workshop recap

“Identity is the new perimeter.” This catch phrase is present in almost every website of identity security vendors, and for a good reason. Human access, more commonly referred to as user access, is an...

View Article


Image may be NSFW.
Clik here to view.

What are non-human identities?

Non-human identities (NHI) are digital, automated and programmable access credentials that play a crucial role in securing systems, managing access, and ensuring the integrity of digital environments....

View Article
Browsing latest articles
Browse All 19 View Live


Latest Images