Blog

Sisense Breach Shows Danger of Third Party “Forever” Tokens
By Chris Parlette
on April 25, 2024
The recent breach at Sisense started with an AWS access token to a Gitlab repository and has led to all Sisense customers having to rotate any access token they’ve ever given to Sisense. While most headline-grabbing breaches involve personal information, the...
Cracking the Code Pt 3: The Imperative of Multi-Factor Authentication in Machine-to-Machine Communication
Corsha
By Corsha
on October 04, 2023
In the transformative era of Industry 4.0, where automation, data exchange, and IoT technologies converge, the seamless communication between machines stands as the backbone of modern industrial operations. However, this unparalleled connectivity also introduces a...
Cracking the Code Pt 2: Unraveling OT to IT Communication Challenges and Solutions
Corsha
By Corsha
on September 27, 2023
The ongoing digital transformation, often referred to as Industry 4.0, is fundamentally changing traditional industrial systems. This wave of innovation affects various aspects, including manufacturing and supply chain management, making the integration of digital...
Cracking the Code Pt 1: Unraveling OT to IT Communication Challenges and Solutions
Corsha
By Corsha
on September 19, 2023
In the realm of modern industries, two critical pillars stand tall – Operational Technology (OT) and Information Technology (IT). Each plays a distinct yet interconnected role, forming the foundation upon which today's industrial landscape is built. Understanding the...
Lessons To Take From Human MFA (and what it means for machines)
Corsha
By Corsha
on September 05, 2023
In the realm of identity and access management (IAM), Multi-Factor Authentication (MFA) has emerged as a stalwart defender against unauthorized access and data breaches. As we harness the insights gained from Human MFA, Corsha is embarking on a journey to define and...
How the Darknet Informs API Security Tactics
Corsha
By Corsha
on July 25, 2023
Do you know what goes on in the darknet? Well, your API security could be at stake. DarkOwl, a leading provider of darknet data, has observed conversations on the darknet on topics including hacking APIs, stolen API secrets that are then traded in underground digital...
How Machine to Machine Security Enables Secure Automation
Corsha
By Corsha
on July 12, 2023
Automated processes power today’s workflows for countless organizations of all shapes, verticals, and sizes. According to Gartner, 70% of organizations will implement structured automation to enable flexibility and efficiency throughout their businesses by the end of...
MFA for M2M Communications: The Missing Piece in Your Zero Trust Architecture
Corsha
By Corsha
on June 27, 2023
The popularity of zero trust and multifactor authentication (MFA) is on the rise, with no sign of slowing down. But when most people think of MFA, they only think about a fraction of web traffic – the traffic guided by human users. However, there were 8.9 billion...

Get started today

Reach out today to request a demo

Contact Us