Blog

How to Reduce Alert Fatigue in Industrial Networks Without Losing Visibility
By David Mazary
on June 27, 2025
Zero in on what Matters. Cut the Noise. Keep the Visibility In industrial operations, monitoring is essential — but not all alerts are created equal. Teams rely on network detection and response monitoring tools to detect threats, but too often, they’re overwhelmed...
How to Secure Every Connection in Your Industrial Network
By Chris Parlette
on June 17, 2025
5 steps to protect industrial networks, reduce risk, and maintain uptime for operational systems. In industrial networks and OT environments, the real risk isn’t just outside threats — it’s what gets inside through unmanaged, invisible, or unauthorized connections.
Corsha's Latest Release Connects Cloud Identity Providers
By Chris Parlette
on March 18, 2025
New Features in Corsha v1.21 Corsha allows for easy provisioning of cryptographic identities, automatic rotation, utilization of one-time-use credentials, and real-time access control for every trusted API client in your core application infrastructure. To further...
Secure by Demand: How CISA’s Latest Guidance Informs OT Cybersecurity Priorities
By Joel Krooswyk  
on February 03, 2025
On January 13, 2025, the Cybersecurity & Infrastructure Security Agency (CISA) published a new resources partnership with a global contingent, from the NSA and FBI in the U.S. to Australia’s Cyber Security Centre, Canada’s Center for Cyber Security, and several...
How we put a pin in 2024 at Corsha. Looking forward....
By Andrew Dubbs
on January 18, 2025
As we kick off 2025, the Corsha team would like to take a moment to reflect on a truly remarkable year. This past year brought significant milestones and transformative growth. From achieving an Authorization to Operate (ATO) with the Department of Defense to deepening...
Corsha's Annual Cookie Exchange: A Sweet Tradition of Fun and Flavor
Corsha
By Corsha
on January 18, 2025
While it’s certainly about enjoying great homemade treats, it’s also about connecting with each other in a meaningful way—learning about teammates through their recipes, celebrating diverse approaches to baking, and taking time to appreciate one another’s efforts. It’s...
OT Security Wrapped: 5 Highlights from 2024
By Chris Parlette
on January 01, 2025
Operational Technology (OT) is a key part of many industries in our day-to-day lives, but has historically been underserved by cybersecurity tools and concepts. That trend seems to be changing, as a growing spotlight on OT cyberattacks and defense mechanisms has led to...
Our Journey to Hardened Containers
By Christian Petersen
on December 09, 2024
At Corsha, security is a core principle in everything we build. This means carefully evaluating our software supply chain and choosing products and services that align with our rigorous standards. One key component of our DevSecOps pipeline is Iron Bank, which ensures...
What Is an Authority to Operate (ATO) and Why It Matters for OT?
By Peter Gray
on December 02, 2024
As OT systems and IT networks become more interconnected, the cybersecurity risks grow along with them. That’s why having a solid risk assessment and management process tailored specifically for OT is so important—it helps safeguard your organization’s data,...
Agile - Not Just for the Engineers
By Andrew Dubbs
on November 22, 2024
In enterprise SaaS, the agile methodology has become ubiquitous. With 86% of software development teams and 63% of IT departments leveraging agile practices such as sprint planning, daily standups, and retrospectives, this iterative approach has proven essential. Agile...

Get started today

Reach out today to request a demo

Contact Us