BLOG

Stay informed with the latest insights, trends, and updates on the Non-Human Identity landscape

From understanding Non-Human Identity complexities to tips on enhancing security posture and learning about recent breaches, our blog is the go-to resource for all things Non-Human Identity security.

COMPANY NEWS

Clutch x Torq: Supercharging NHI Security for the Modern SOC

Clutch x Torq: Supercharging NHI Security for the Modern SOC

COMPANY NEWS

Clutch x Torq: Supercharging NHI Security for the Modern SOC

Shattering the Rotation Illusion: Part 6 - The Attacker’s Perspective & Introducing AWSKeyLockdown

TECH RESEARCH

Shattering the Rotation Illusion: Part 6 - The Attacker’s Perspective & Introducing AWSKeyLockdown

Shattering the Rotation Illusion: Part 5 - The Internet Archive Breach & An RDS Bonus

TECH RESEARCH

Shattering the Rotation Illusion: Part 5 - The Internet Archive Breach & An RDS Bonus

Shattering the Rotation Illusion: Part 4 - Developer Forums

TECH RESEARCH

Shattering the Rotation Illusion: Part 4 - Developer Forums

Shattering the Rotation Illusion: Part 3 - Code Snippets & Sharing Platforms

TECH RESEARCH

Shattering the Rotation Illusion: Part 3 - Code Snippets & Sharing Platforms

Shattering the Rotation Illusion: Part 2 - Package Managers

TECH RESEARCH

Shattering the Rotation Illusion: Part 2 - Package Managers

Shattering the Rotation Illusion: Part 1 - Code Hosting & Version Control Platforms

TECH RESEARCH

Shattering the Rotation Illusion: Part 1 - Code Hosting & Version Control Platforms

The Day We Unveiled the Secret Rotation Illusion

TECH RESEARCH

The Day We Unveiled the Secret Rotation Illusion

Introducing the Clutch Security VSCode Extension: Secret Scanning at the Source

TECH RESEARCH

Introducing the Clutch Security VSCode Extension: Secret Scanning at the Source

GitHub Steps Up Its NHI Monitoring Game

TECH RESEARCH

GitHub Steps Up Its NHI Monitoring Game

Simplifying Secrets Management, but at a Cost: A Deep Dive into AWS Secrets Manager Agent

TECH RESEARCH

Simplifying Secrets Management, but at a Cost: A Deep Dive into AWS Secrets Manager Agent

Token Trouble: How a Malicious Update Brought Crypto Mining to Lottie Player Users

BREACH ANALYSIS

Token Trouble: How a Malicious Update Brought Crypto Mining to Lottie Player Users

Tokens Gone Wild: Inside the Internet Archive's Two-Year Exposure

BREACH ANALYSIS

Tokens Gone Wild: Inside the Internet Archive's Two-Year Exposure

The Modern Workforce is Non-Human: Why Agentic AI Will Change Everything

INDUSTRY INSIGHTS

The Modern Workforce is Non-Human: Why Agentic AI Will Change Everything

Stop Rotating Secrets: How Frequent Key Changes Undermine Modern Security

INDUSTRY INSIGHTS

Stop Rotating Secrets: How Frequent Key Changes Undermine Modern Security

Introducing the NHI Index: A Centralized Resource for Securing Non-Human Identities

TECH RESEARCH

Introducing the NHI Index: A Centralized Resource for Securing Non-Human Identities

Future-Proofing Financial Institutions: Non-Human Identity Security Under DORA

INDUSTRY INSIGHTS

Future-Proofing Financial Institutions: Non-Human Identity Security Under DORA

The Map is Not The Territory: Transcending Fixed Security Landscapes

INDUSTRY INSIGHTS

The Map is Not The Territory: Transcending Fixed Security Landscapes

The Booming NHI Landscape: From Secret Sprawl to NHI Sprawl

INDUSTRY INSIGHTS

The Booming NHI Landscape: From Secret Sprawl to NHI Sprawl

Introducing Clutch: Revolutionizing Non-Human Identity Security

COMPANY NEWS

Introducing Clutch: Revolutionizing Non-Human Identity Security

The Genesis of Clutch: A Founder’s Perspective

COMPANY NEWS

The Genesis of Clutch: A Founder’s Perspective

Unveiling the Evolution: The Transformation of Non-Human Identities in the Enterprise World

INDUSTRY INSIGHTS

Unveiling the Evolution: The Transformation of Non-Human Identities in the Enterprise World

The Sisense Breach: An Incident Response Angle

BREACH ANALYSIS

The Sisense Breach: An Incident Response Angle

Dropbox Sign: Compromised Non-Human Identity Leads to Customer Data Breach

BREACH ANALYSIS

Dropbox Sign: Compromised Non-Human Identity Leads to Customer Data Breach

The New York Times Exposed GitHub Token Breach

BREACH ANALYSIS

The New York Times Exposed GitHub Token Breach

Human vs Non-Human Identities: A Comparison for Security Professionals - Part II

INDUSTRY INSIGHTS

Human vs Non-Human Identities: A Comparison for Security Professionals - Part II

Human vs Non-Human Identities: A Comparison for Security Professionals - Part I

INDUSTRY INSIGHTS

Human vs Non-Human Identities: A Comparison for Security Professionals - Part I