Industry Insights
A Human’s Guide to Non-Human Identities (NHIs)
10 min read As apps and service accounts proliferate, robust management is key to maintaining automated, scalable, and resilient IT environments. The post A Human’s Guide to Non-Human Identities (NHIs) appeared first ...
Mastering Cloud Security: Uncovering Hidden Vulnerabilities with NodeZero™
Master cloud security with NodeZero™ Cloud Pentesting. Easily uncover vulnerabilities across AWS and Azure, prioritize identity risks, and secure your environment in just minutes. Stay ahead of threats. The post Mastering Cloud ...
Ensuring Cybersecurity: Horizon3.ai’s Rapid Response Service in Action
How Horizon3.ai’s Rapid Response Identified and Mitigated a Critical Mirth Connect Vulnerability A key consideration in cybersecurity is determining whether a known software vulnerability is actually exploitable. This often depends on how ...
Which Matters More for Non-Human Identities: Governance or Access Management?
3 min read As organizations emphasize safeguarding non-human identities, you must balance immediate security measures with long-term oversight and compliance. The post Which Matters More for Non-Human Identities: Governance or Access Management? ...
Why Devs Aren’t Responsible for Non-Human Credential Hygiene
3 min read Security teams can enhance business operations by providing workload credential management as a service, freeing developers to focus on innovation. The post Why Devs Aren’t Responsible for Non-Human Credential ...
Enhancing Vulnerability Management: Integrating Autonomous Penetration Testing
Traditional vulnerability scanning tools are enhanced with NodeZero's autonomous penetration testing, revolutionizing Vulnerability Management by providing comprehensive risk assessment, exploitability analysis, and cross-host vulnerability chaining, empowering organizations to prioritize and mitigate security ...
Credential and Secrets Theft: Insights from the 2024 Verizon Data Breach Report
4 min read Stolen identity data remains part of a large percentage of breaches, according to the annual landmark report. The post Credential and Secrets Theft: Insights from the 2024 Verizon Data ...
An Open Letter to API Vendors: Embrace Secure Authentication Methods, Abandon API Keys
3 min read As the demand for API access continues to grow, so does the urgency of adopting more secure authentication methods. The post An Open Letter to API Vendors: Embrace Secure ...
NodeZero: Testing for Exploitability of Palo Alto Networks CVE-2024-3400
On April 12 (and then updated again on April 20), Palo Alto Networks released an advisory about a vulnerability in the PAN-OS® software that runs Palo Alto Networks® Next-Generation Firewalls (NGFWs). The ...
Securing CI/CD Pipelines: The Role of Workload Identity Federation
3 min read By introducing vulnerabilities, long-lived credentials can erase the rapid, iterative improvements automated software processes are designed to deliver. The post Securing CI/CD Pipelines: The Role of Workload Identity Federation ...