Search Corsha Solutions

    Blog

    5 Takeaways from the Wiz Attack of SAP AI Core
    By Chris Parlette
    on July 30, 2024
    A recent blog post by Wiz detailed an attack performed on a customer tenant of the SAP AI Core platform. Here’s a short summary of the attack:
    Snowflake Data Breach Heightens the Call for Non-Human IAM, Zero-Trust, and MFA for Machines
    By Kevin Thomas
    on July 24, 2024
    In an unprecedented event that has shaken the cybersecurity landscape, Snowflake, a major player in data consolidation, has fallen victim to what is now turning out to be the largest data breach in world history. The culprit? A sophisticated threat actor identified as ...
    Secure by Design Goes Beyond Software Development Best Practices
    By Joel Krooswyk  
    on July 10, 2024
    CISA’s Secure by Design, now in its second year, is beginning to pivot to a "Secure by Demand" terminology. Secure by Demand encourages software procurers to push for secure by demand attestations and to obtain proof of secure development practices to quantify the risk...
    Corsha Releases Kong Gateway Plugin bringing MFA to Non-Human Identities
    By Kalynn Rhew
    on June 04, 2024
    Kong Gateway is the world’s most adopted open source API gateway. In the realm of security, Kong Gateway offers a comprehensive suite of features such as authorization, authentication, and request validation. Kong’s flexibility extends to custom security plugins,...
    Corsha Cloud Available at IL5 on Google Cloud
    By Robert Batson
    on May 20, 2024
    To comply with all regulatory requirements for US government-affiliated users, Corsha Cloud is available using Google Cloud Platform's Assured Workloads. This feature allows us to provide a highly secure and compliant environment tailored specifically for government...
    Sisense Breach Shows Danger of Third Party “Forever” Tokens
    By Chris Parlette
    on April 25, 2024
    The recent breach at Sisense started with an AWS access token to a Gitlab repository and has led to all Sisense customers having to rotate any access token they’ve ever given to Sisense. While most headline-grabbing breaches involve personal information, the...
    Securing Machine-to-Machine Communication with Zero Trust
    Corsha
    By Corsha
    on March 25, 2024
    Originally coined by Forrester Research analyst John Kindervag in 2010, Zero Trust represents a significant shift in cybersecurity philosophy, advocating for the principle of "never trust, always verify" in network access and communication. Moreover, the framework...
    The Integration of AI-Driven Threat Detection and Post-Quantum Cryptography in Diverse Environments
    Corsha
    By Corsha
    on March 19, 2024
    Traditional cybersecurity measures are often insufficient to safeguard against evolving threats in today's diverse environments. However, recent advancements in cybersecurity technologies offer innovative solutions to bolster the security of machine-to-machine...
    From Endpoints to Ecosystems: Comprehensive Security in Machine-to-Machine Communication
    Corsha
    By Corsha
    on February 14, 2024
    Interconnected systems and data-driven operations require a comprehensive and holistic approach to security. While securing individual endpoints remains crucial, organizations must now extend their focus to fortifying the entire ecosystem of machine-to-machine (M2M)...

    Get started today

    Reach out today to request a demo

    Contact Us