The first-ever NHI Security Conference is happening on September 18 in NYC, and you're invited! 🗽 Join us for a cutting-edge event hosted with Cloud Security Alliance, packed with all things NHI Security. From inspiring discussions with peers to real-world case studies and top-notch networking with fellow security leaders. 🥂 📅 September 18, 2024 📍 World Trade Center, NYC Secure your spot now and take part in shaping the future of NHI security: https://lnkd.in/dt6pa2tg
About us
With 10,000 non-human identities for every 1,000 employees, NHIs are the biggest blindspot in IAM security programs. Recent high-profile attacks like Okta, Cloudflare, and MS Midnight Blizzard prove that service accounts, API keys, OAuth apps, SSH keys, and other NHIs hold privileged, ungoverned access to enterprise environments and should be protected as vigorously as human identities. Astrix Security is the first platform purposely built to control and manage the lifecycle of non-human identities, helping enterprises like NetApp, Figma and Agoda control their NHI attack surface and prevent supply chain attacks. The platform provides continuous discovery, posture management, threat detection, and automatic remediation for non-human identities across business and engineering environments. An RSA Innovation Sandbox finalist and 2023 Gartner Cool Vendor for Identity-first security.
- Website
-
https://www.astrix.security/
External link for Astrix Security
- Industry
- Computer and Network Security
- Company size
- 51-200 employees
- Headquarters
- New York
- Type
- Privately Held
- Founded
- 2021
Products
Locations
-
Primary
New York, US
-
Manhattan Ave
New York, NY, US
Employees at Astrix Security
-
Dimitri Sirota
BigID - Know Your Data | Control Your Data
-
Rodney Toy
Advisor; GTM /Sales / Revenue Operations Executive; Contemporary Artist; Executive Board Member and Treasurer at Art in Action
-
Shira Kaplan
Cyber-Security Entrepreneur & Investor | Board Advisor to Selected Cyber-Security Startups | WEF Young Global Leader (2017) | Bilanz 100 Digital…
-
Tammy Moskites
Career CISO - CIO - F50 - Executive Board Advisor International Keynote Speaker | I Love What I Do!!! My Views are My Own
Updates
-
We׳re live with Chris Hughes 🔊
President @ Aquia | Cyber Innovation Fellow @ CISA | Chief Security Advisor @ Endor Labs | 2x Author | Veteran
In this episode we sit down with Michael Silva of Astrix Security to discuss Securing Non-Human Identities (NHI)'s.
Resilient Cyber w/ Michael Silva - Securing Non-Human Identities
www.linkedin.com
-
Why secure Non-Human Identities? 🤔 Join Chris H. and our own Michael Silva for a LIVE discussion about the ins and outs of #NHI security. Get insights on topics like: 💡 The common NHI attack paths that attackers love to exploit 💡 Who should own NHI Security in your organization 💡 Quick tips to starting an NHI Security program See you tomorrow!
President @ Aquia | Cyber Innovation Fellow @ CISA | Chief Security Advisor @ Endor Labs | 2x Author | Veteran
In this episode we sit down with Michael Silva of Astrix Security to discuss Securing Non-Human Identities (NHI)'s.
Resilient Cyber w/ Michael Silva - Securing Non-Human Identities
www.linkedin.com
-
Starting the morning of #BlackHat with a delicious breakfast and casual conversations? Yes, please! 🥓☕🤝 Join Astrix and Endor Labs for our exclusive CISO Breakfast, and enjoy networking with fellow security executives over unlimited coffee and scrumptious food. 📅 Wednesday, August 7 🕒 8:00 AM - 10:00 AM 📍 Border Grill, Mandalay Bay Limited spots available — DM us for details or register here: https://lnkd.in/dD7WkzZr
-
-
𝐃𝐞𝐭𝐞𝐜𝐭𝐢𝐧𝐠 𝐜𝐨𝐦𝐩𝐫𝐨𝐦𝐢𝐬𝐞𝐝 𝐬𝐞𝐜𝐫𝐞𝐭𝐬 𝐚𝐧𝐝 𝐜𝐚𝐫𝐞𝐥𝐞𝐬𝐬 𝐯𝐞𝐧𝐝𝐨𝐫𝐬 𝐮𝐬𝐢𝐧𝐠 𝐛𝐞𝐡𝐚𝐯𝐢𝐨𝐫𝐚𝐥 𝐚𝐧𝐚𝐥𝐲𝐬𝐢𝐬 🚨 The latest real-life #AstrixStory reveals how two customers leveraged Astrix's detection engines to uncover sensitive secrets locally stored on a stolen laptop, and a vendor's engineering team using customer secrets to test new capabilities. This story perfectly portrays why behavioral analysis is key to properly secure #NHIs. Read it here: https://lnkd.in/e4-TxUGu
-
-
Who’s ready for Vegas? 🙋 With #BlackHat around the corner, we’ve got tons of exciting things lined up: 🗓️ August 7-8 | Participate in our interactive prize challenge, chat with our experts, and find out why Astrix is the leader in #NHI security. See you at Booth SC521. 🍳 August 7 | Start your morning with our Exclusive CISO Breakfast hosted with Endor Labs. Great food, even better conversations. Limited spots —DM us for details. 🥂 August 7 | Find us at the CyAlliance® Annual Networking Party Event at #BlackHat. We can’t wait! 🍽️ August 8 | Excited to join our partner, EverSec Group, Inc., at their Customer Dinner at Delilah for great discussions and delicious food. 📢 Pre-book a session with our team for a dive deep into how you can close the NHI Security gap with Astrix: https://lnkd.in/g8PJYMTb See you in there? 🎲
-
-
We're thrilled to announce the FIRST EVER Non-Human Identity Security Conference in the heart of NYC, co-hosted with Cloud Security Alliance! 🗽✨ 𝐖𝐡𝐞𝐧: Sep 18, 2024 𝐖𝐡𝐞𝐫𝐞: World Trade Center, New York 𝐖𝐡𝐲: 🔹 Dive into real NHI case studies from top enterprises 🔹 Engage in conversations with leading security executives pioneering the NHI security space 🔹 Enjoy unbeatable networking over delicious breakfast and lunch This is your chance to take part in the future of NHI security and connect with the brightest minds in the field. Ready to be part of something big? Register now and secure your spot! 👇 https://lnkd.in/dt6pa2tg Gary Owen John Yeoh Timothy Youngblood, CISSP E Coleen C. Vinay P. Gerhard Eschelbeck Dr. Chase Cunningham Dmitriy Sokolovskiy, CISSP, QTE Emilio E. Heather Hinton
-
Incident report: PyPI Admin Personal Access Token leak 🚨 The PyPI team recently reported a security incident where an admin's personal access token was accidentally leaked. This token was used to modify several packages on the platform. Fortunately, the PyPI team acted swiftly, revoked the token, and restored the affected packages to their previous states. This incident highlights the persistent risk of credential leakage. Often, organizations are unaware that a key has been leaked until it is actively being exploited. To mitigate such risks, the Astrix Research team suggests the following best practices: ✅ Limit access: Ensure that personal access tokens have minimal privileges necessary for their function. ✅ Set expiration times: Tokens should have an expiration date to reduce the risk window in case of a leak. ✅ Monitor for abnormal behavior: Implement automated monitoring to detect any unusual activities as a last line of defense. To learn how Astrix can help with leaked PATs and any other NHI, watch the product in action: https://lnkd.in/gk-BRzQA
-
-
We are thrilled to welcome Ryan Rockenbaugh as our new Senior Field Marketing & Lead Gen Manager! 🎉 With a wealth of experience leading field marketing efforts in top companies across diverse industries, Ryan brings a fresh approach to our team that will surely propel Astrix to new heights. Join us in giving Ryan a warm welcome 🤗
-
-
A must-read piece ahead! 📰 Our CISO in Residence Timothy Youngblood, CISSP talked to Gomboc.ai about aligning security with business goals, the challenges of #NHI security, and the future of AI threats. From actionable strategies to real-world examples, this article is a treasure trove of insights for any cybersecurity professional. Happy reading! 🤓