Five Real-World Attack Chains Involving NHIs: Lessons from SecDays France

Five Real-World Attack Chains Involving NHIs: Lessons from SecDays France

In this post, we break down five real-world attack chains involving Non-Human Identities, as presented by Julien Szlamowicz-Czubak from Fenrisk and Pierre Le Clézio from GitGuardian at SecDays France. We’ll share critical lessons for every organization looking to secure its machine identities from their talk “ ... Read More
Why Most Exposed Secrets Never Get Fixed

Why Most Exposed Secrets Never Get Fixed

Our latest State of Secrets Sprawl 2025 research reveals a troubling reality: the majority of leaked corporate secrets found in public code repositories continue to provide access to systems for years after their discovery ... Read More
Why Machine Identity Security is Your Next Critical Battlefront

Why Machine Identity Security is Your Next Critical Battlefront

In this blog, we’ll break down why machine identity security is essential, highlight Gartner’s recent research, and connect these insights to real-world issues and solutions discussed in our NHI blog series ... Read More
Keeping Secrets Out of Logs: Building a Robust Defence Against Log Leaks

Keeping Secrets Out of Logs: Strategies That Work

tl;dr: There's no silver bullet for keeping secrets out of logs, but if we put several "lead bullets" in the right places, we have a good chance of success ... Read More
From Confidence to Competence: Overcoming Secrets Management Challenges

From Confidence to Competence: The Reality of Secrets Management

The confidence gap in secrets management is real: 75% of organizations feel secure while only 44% of developers follow best practices. Discover what security experts reveal about remediation challenges, responsibility issues, and practical solutions for protecting your most sensitive credentials ... Read More