Interested in sponsoring an issue of Resilient Cyber?
This includes reaching over 6,000 subscribers, ranging from Developers, Engineers, Architects, CISO’s/Security Leaders and Business Executives
Reach out below!
- First off, for those unfamiliar with you can you tell us a bit about your background?
- There is a lot of industry hype right now about "Non-Human Identities" or NHI's as they're called, what exactly are NHI's?
- We know that credentials have long been a primary attack vector due to sources like DBIR and others. Why are NHI's getting so much attention now, and how have they been overlooked before?
- What are some key things organizations need to keep in mind when they're thinking about securing NHI's?
- How do NHI's play into things like software supply chain attacks and/or third party risk?
- For folks looking for tooling to help tackle NHI risks, what are some key capabilities to be looking for?
- How do NHIs open gaps in the current security footprint of companies who are already leveraging tools such as SSPM, CNAPP, IGA, etc.
- This is always a good topic to talk about how many of these platforms are monitored by disparate teams and focus more on external threats specific to their vertical, vs the trusted paths opened by the interconnectivity between SaaS, PaaS, IaaS and on prem environments which is a main use case of why NHIs exist.
- Where can folks learn more about Astrix, and what are you all currently excited about that you're working on?
Resilient Cyber w/ Michael Silva - Securing Non-Human Identities