NHI Forum
Inside the GhostAction Attack: 3,325 Exposed Secrets from Compromised GitHub Workflows
First post and replies | Last post by GitGuardian, 2 months ago
Cloud Infrastructure Entitlement Management (CIEM): The Business Value
First post and replies | Last post by Unosecur, 2 months ago
AI-Powered Ransomware Is Rising - Here’s How CIEM and Cloud Identity Defenses Help
First post and replies | Last post by Unosecur, 2 months ago
The Top 6 Cloud IAM Misconfigurations Putting Identity Security at Risk
First post and replies | Last post by Unosecur, 2 months ago
Incident Investigations Across GitHub, AWS, Okta, and More
First post and replies | Last post by Teleport, 2 months ago
Salesloft OAuth Compromise: Lessons Learned and Next Steps for Security
First post and replies | Last post by Oasis Security, 2 months ago
Salesforce Breach via Drift: How Attackers Abused OAuth at Scale
First post and replies | Last post by Entro Security, 2 months ago
Persistence in Entra: The Role of Illicit Consent-Granting and App Backdooring
First post and replies | Last post by SlashID, 2 months ago
How Managed Identities Are Transforming Multi-Cloud Security
First post and replies | Last post by GitGuardian, 2 months ago
Inside the Nx "s1ngularity" Attack: How the Credential Leak Happened
First post and replies | Last post by GitGuardian, 2 months ago
Inside Our Engineering Hiring Process: Why We Designed It This Way
First post and replies | Last post by Teleport, 2 months ago
The Drift OAuth Breach: How Salesforce Became a De Facto Credential Repository
First post and replies | Last post by Aembit, 2 months ago
The Next Stage of Privileged Access Management (PAM): Beyond Vaulting
First post and replies | Last post by Britive, 3 months ago
Why PAM Needs a Paradigm Shift in 2025
First post and replies | Last post by Britive, 3 months ago
Salesforce OAuth Token Key Breach: Key Lessons from the GTIG Advisory
First post and replies | Last post by Astrix Security, 3 months ago
5 Proven Ways to Speed Up AWS with Just-in-Time Access
First post and replies | Last post by Teleport, 3 months ago
Are Financial Institutions Safe from Their Own Secrets?
First post and replies | Last post by Akeyless, 3 months ago
Tokenization Explained: What It Is and How It Works
First post and replies | Last post by Akeyless, 3 months ago
Top 5 FAQs About Non-Human Identities
First post and replies | Last post by Natoma, 3 months ago