Blog

Corsha's Latest Release Connects Cloud Identity Providers
By Chris Parlette
on March 18, 2025
New Features in Corsha v1.21 Corsha allows for easy provisioning of cryptographic identities, automatic rotation, utilization of one-time-use credentials, and real-time access control for every trusted API client in your core application infrastructure. To further...
Secure by Demand: How CISA’s Latest Guidance Informs OT Cybersecurity Priorities
By Joel Krooswyk  
on February 03, 2025
On January 13, 2025, the Cybersecurity & Infrastructure Security Agency (CISA) published a new resources partnership with a global contingent, from the NSA and FBI in the U.S. to Australia’s Cyber Security Centre, Canada’s Center for Cyber Security, and several...
How we put a pin in 2024 at Corsha. Looking forward....
By Andrew Dubbs
on January 18, 2025
As we kick off 2025, the Corsha team would like to take a moment to reflect on a truly remarkable year. This past year brought significant milestones and transformative growth. From achieving an Authorization to Operate (ATO) with the Department of Defense to deepening...
Corsha's Annual Cookie Exchange: A Sweet Tradition of Fun and Flavor
Corsha
By Corsha
on January 18, 2025
While it’s certainly about enjoying great homemade treats, it’s also about connecting with each other in a meaningful way—learning about teammates through their recipes, celebrating diverse approaches to baking, and taking time to appreciate one another’s efforts. It’s...
OT Security Wrapped: 5 Highlights from 2024
By Chris Parlette
on January 01, 2025
Operational Technology (OT) is a key part of many industries in our day-to-day lives, but has historically been underserved by cybersecurity tools and concepts. That trend seems to be changing, as a growing spotlight on OT cyberattacks and defense mechanisms has led to...

Get started today

Reach out today to request a demo

Contact Us