NHI Forum
The Non-Human Identities Ownership Problem: Who Really Governs Your Enterprise NHIs?
First post and replies | Last post by GitGuardian, 2 months ago
Shai-Hulud: Inside a Persistent Secret-Leaking Campaign Targeting Enterprises
First post and replies | Last post by GitGuardian, 2 months ago
Preventing OAuth Attacks in SaaS: Lessons from the Salesforce-Drift Breach
First post and replies | Last post by Akeyless, 2 months ago
How a Secrets Manager Extension for Cursor and VS Code Strengthens Developer Security
First post and replies | Last post by Akeyless, 2 months ago
What the Salesloft Drift Breach Teaches Us About Access Token Security
First post and replies | Last post by SlashID, 2 months ago
Cursor RCE in Open Repos: How Simple Access Leads to Full Compromise
First post and replies | Last post by Oasis Security, 2 months ago
From SharePoint to SecretPoint: How Microsoft Auto-Sync Exposes Enterprise Secrets
First post and replies | Last post by Entro Security, 2 months ago
Inside the GhostAction Attack: 3,325 Exposed Secrets from Compromised GitHub Workflows
First post and replies | Last post by GitGuardian, 3 months ago
Cloud Infrastructure Entitlement Management (CIEM): The Business Value
First post and replies | Last post by Unosecur, 3 months ago
AI-Powered Ransomware Is Rising - Here’s How CIEM and Cloud Identity Defenses Help
First post and replies | Last post by Unosecur, 3 months ago
The Top 6 Cloud IAM Misconfigurations Putting Identity Security at Risk
First post and replies | Last post by Unosecur, 3 months ago
Incident Investigations Across GitHub, AWS, Okta, and More
First post and replies | Last post by Teleport, 3 months ago
Salesloft OAuth Compromise: Lessons Learned and Next Steps for Security
First post and replies | Last post by Oasis Security, 3 months ago
Salesforce Breach via Drift: How Attackers Abused OAuth at Scale
First post and replies | Last post by Entro Security, 3 months ago
Persistence in Entra: The Role of Illicit Consent-Granting and App Backdooring
First post and replies | Last post by SlashID, 3 months ago
How Managed Identities Are Transforming Multi-Cloud Security
First post and replies | Last post by GitGuardian, 3 months ago
Inside the Nx "s1ngularity" Attack: How the Credential Leak Happened
First post and replies | Last post by GitGuardian, 3 months ago
Inside Our Engineering Hiring Process: Why We Designed It This Way
First post and replies | Last post by Teleport, 3 months ago
The Drift OAuth Breach: How Salesforce Became a De Facto Credential Repository
First post and replies | Last post by Aembit, 3 months ago
The Next Stage of Privileged Access Management (PAM): Beyond Vaulting
First post and replies | Last post by Britive, 3 months ago