Search Corsha Solutions

    Blog

    Chris Parlette

    How to Secure Every Connection in Your Industrial Network
    By Chris Parlette
    on June 17, 2025
    5 steps to protect industrial networks, reduce risk, and maintain uptime for operational systems. In industrial networks and OT environments, the real risk isn’t just outside threats — it’s what gets inside through unmanaged, invisible, or unauthorized connections.
    Corsha's Latest Release Connects Cloud Identity Providers
    By Chris Parlette
    on March 18, 2025
    New Features in Corsha v1.21 Corsha allows for easy provisioning of cryptographic identities, automatic rotation, utilization of one-time-use credentials, and real-time access control for every trusted API client in your core application infrastructure. To further...
    OT Security Wrapped: 5 Highlights from 2024
    By Chris Parlette
    on January 01, 2025
    Operational Technology (OT) is a key part of many industries in our day-to-day lives, but has historically been underserved by cybersecurity tools and concepts. That trend seems to be changing, as a growing spotlight on OT cyberattacks and defense mechanisms has led to...
    Understanding the Divide: OT vs. IT Infrastructure
    By Chris Parlette
    on August 22, 2024
    In today's digital landscape, where technology permeates every aspect of our lives, it's essential to grasp the fundamental differences between Operational Technology (OT) and Information Technology (IT) infrastructure. While both are crucial components of modern...
    5 Takeaways from the Wiz Attack of SAP AI Core
    By Chris Parlette
    on July 30, 2024
    A recent blog post by Wiz detailed an attack performed on a customer tenant of the SAP AI Core platform. Here’s a short summary of the attack:
    Sisense Breach Shows Danger of Third Party “Forever” Tokens
    By Chris Parlette
    on April 25, 2024
    The recent breach at Sisense started with an AWS access token to a Gitlab repository and has led to all Sisense customers having to rotate any access token they’ve ever given to Sisense. While most headline-grabbing breaches involve personal information, the...

    Get started today

    Reach out today to request a demo

    Contact Us