Blog

Our Journey to Hardened Containers
By Christian Petersen
on December 09, 2024
At Corsha, security is a core principle in everything we build. This means carefully evaluating our software supply chain and choosing products and services that align with our rigorous standards. One key component of our DevSecOps pipeline is Iron Bank, which ensures...
What Is an Authority to Operate (ATO) and Why It Matters for OT?
By Peter Gray
on December 02, 2024
As OT systems and IT networks become more interconnected, the cybersecurity risks grow along with them. That’s why having a solid risk assessment and management process tailored specifically for OT is so important—it helps safeguard your organization’s data,...
Agile - Not Just for the Engineers
By Andrew Dubbs
on November 22, 2024
In enterprise SaaS, the agile methodology has become ubiquitous. With 86% of software development teams and 63% of IT departments leveraging agile practices such as sprint planning, daily standups, and retrospectives, this iterative approach has proven essential. Agile...
Cybersecurity Compliance Drivers in the Age of Industry 4.0
By Scott Hopkins
on November 05, 2024
The ongoing Digital Revolution of the past half-century is marked by the dramatic rise of information technology (IT) and the drive to connect humans with ever increasing amounts of digital information and applications to make more use of that information. During this...
An Intro to X.509 certificates, TLS, and mTLS
By Hunter Metcalfe
on October 16, 2024
Understanding X.509 Certificates in TLS and mTLS Transport Layer Security (TLS) and its enhanced version, Mutual TLS (mTLS), are foundational in securing network communications. At the heart of these protocols are X.509 certificates, which authenticate identities and...
A Quick Take on OWASP API Security Top 10
Robert Birdsong
By Robert Birdsong
on September 29, 2024
The Open Worldwide Application Security Project (OWASP) is a nonprofit organization dedicated to improving software security. Through resources, tools, and guidance, OWASP supports developers, application architects, and security professionals in building secure...
Corsha's Integration with F5 BIG-IP for Automated API Protection
By Kalynn Rhew
on September 23, 2024
How It Works F5 BIG-IP is a suite of hardware and software solutions designed to enhance security, reliability, and performance across networks and applications. BIG-IP’s modular design allows organizations to combine various services in flexible and customizable ways...
Understanding the Divide: OT vs. IT Infrastructure
By Chris Parlette
on August 22, 2024
In today's digital landscape, where technology permeates every aspect of our lives, it's essential to grasp the fundamental differences between Operational Technology (OT) and Information Technology (IT) infrastructure. While both are crucial components of modern...
Memory Lane: 5 Memorable OT Attacks
Robert Birdsong
By Robert Birdsong
on August 05, 2024
Operational Technology (OT) systems have become prime targets for cyber attackers. These systems are essential to industrial processes, and when compromised, they can disrupt critical infrastructure and essential services, lead to significant financial losses, and...
5 Takeaways from the Wiz Attack of SAP AI Core
By Chris Parlette
on July 30, 2024
A recent blog post by Wiz detailed an attack performed on a customer tenant of the SAP AI Core platform. Here’s a short summary of the attack:
Snowflake Data Breach Heightens the Call for Non-Human IAM, Zero-Trust, and MFA for Machines
By Kevin Thomas
on July 24, 2024
In an unprecedented event that has shaken the cybersecurity landscape, Snowflake, a major player in data consolidation, has fallen victim to what is now turning out to be the largest data breach in world history. The culprit? A sophisticated threat actor identified as ...
Secure by Design Goes Beyond Software Development Best Practices
By Joel Krooswyk  
on July 10, 2024
CISA’s Secure by Design, now in its second year, is beginning to pivot to a "Secure by Demand" terminology. Secure by Demand encourages software procurers to push for secure by demand attestations and to obtain proof of secure development practices to quantify the risk...
Corsha Releases Kong Gateway Plugin bringing MFA to Non-Human Identities
By Kalynn Rhew
on June 04, 2024
Kong Gateway is the world’s most adopted open source API gateway. In the realm of security, Kong Gateway offers a comprehensive suite of features such as authorization, authentication, and request validation. Kong’s flexibility extends to custom security plugins,...
Corsha Cloud Available at IL5 on Google Cloud
By Robert Batson
on May 20, 2024
To comply with all regulatory requirements for US government-affiliated users, Corsha Cloud is available using Google Cloud Platform's Assured Workloads. This feature allows us to provide a highly secure and compliant environment tailored specifically for government...
Sisense Breach Shows Danger of Third Party “Forever” Tokens
By Chris Parlette
on April 25, 2024
The recent breach at Sisense started with an AWS access token to a Gitlab repository and has led to all Sisense customers having to rotate any access token they’ve ever given to Sisense. While most headline-grabbing breaches involve personal information, the...
Securing Machine-to-Machine Communication with Zero Trust
Corsha
By Corsha
on March 25, 2024
Originally coined by Forrester Research analyst John Kindervag in 2010, Zero Trust represents a significant shift in cybersecurity philosophy, advocating for the principle of "never trust, always verify" in network access and communication. Moreover, the framework...
The Integration of AI-Driven Threat Detection and Post-Quantum Cryptography in Diverse Environments
Corsha
By Corsha
on March 19, 2024
Traditional cybersecurity measures are often insufficient to safeguard against evolving threats in today's diverse environments. However, recent advancements in cybersecurity technologies offer innovative solutions to bolster the security of machine-to-machine...
From Endpoints to Ecosystems: Comprehensive Security in Machine-to-Machine Communication
Corsha
By Corsha
on February 14, 2024
Interconnected systems and data-driven operations require a comprehensive and holistic approach to security. While securing individual endpoints remains crucial, organizations must now extend their focus to fortifying the entire ecosystem of machine-to-machine (M2M)...

Get started today

Reach out today to request a demo

Contact Us