New Features in Corsha v1.21 Corsha allows for easy provisioning of cryptographic identities, automatic rotation, utilization of one-time-use credentials, and real-time access control for every trusted API client in your core application infrastructure. To further...
On January 13, 2025, the Cybersecurity & Infrastructure Security Agency (CISA) published a new resources partnership with a global contingent, from the NSA and FBI in the U.S. to Australia’s Cyber Security Centre, Canada’s Center for Cyber Security, and several...
As we kick off 2025, the Corsha team would like to take a moment to reflect on a truly remarkable year. This past year brought significant milestones and transformative growth. From achieving an Authorization to Operate (ATO) with the Department of Defense to deepening...
While it’s certainly about enjoying great homemade treats, it’s also about connecting with each other in a meaningful way—learning about teammates through their recipes, celebrating diverse approaches to baking, and taking time to appreciate one another’s efforts. It’s...
Operational Technology (OT) is a key part of many industries in our day-to-day lives, but has historically been underserved by cybersecurity tools and concepts. That trend seems to be changing, as a growing spotlight on OT cyberattacks and defense mechanisms has led to...