BLOG

Stay informed with the latest insights, trends, and updates on the Non-Human Identity landscape

From understanding Non-Human Identity complexities to tips on enhancing security posture and learning about recent breaches, our blog is the go-to resource for all things Non-Human Identity security.

INDUSTRY INSIGHTS

Thoughts on JPMC CISO Open Letter to Suppliers

Thoughts on JPMC CISO Open Letter to Suppliers

INDUSTRY INSIGHTS

Thoughts on JPMC CISO Open Letter to Suppliers

It’s All About Trust: Why NHIs Must Be Continuously Verified

INDUSTRY INSIGHTS

It’s All About Trust: Why NHIs Must Be Continuously Verified

Identity Security Explained: What Is It, Key Threats and Solutions

INDUSTRY INSIGHTS

Identity Security Explained: What Is It, Key Threats and Solutions

Assume Leak: The Mindset Shift That The Security Industry Desperately Needs

INDUSTRY INSIGHTS

Assume Leak: The Mindset Shift That The Security Industry Desperately Needs

Rotation Creates a False Sense of Security: Why It’s an Unnecessary Evil

INDUSTRY INSIGHTS

Rotation Creates a False Sense of Security: Why It’s an Unnecessary Evil

How Many Non-Human Identities Do You Really Have?

INDUSTRY INSIGHTS

How Many Non-Human Identities Do You Really Have?

IAM Lifecycle: What is it, Stages & Best Practices

INDUSTRY INSIGHTS

IAM Lifecycle: What is it, Stages & Best Practices

What is Machine Identity Management: Benefits & Best Practices

INDUSTRY INSIGHTS

What is Machine Identity Management: Benefits & Best Practices

Demystifying Ephemeral Identities: Why They’re the Future of NHI Security

INDUSTRY INSIGHTS

Demystifying Ephemeral Identities: Why They’re the Future of NHI Security

Non-Human Identity Security vs. CIEM: Understanding the Differences and Why It Matters

INDUSTRY INSIGHTS

Non-Human Identity Security vs. CIEM: Understanding the Differences and Why It Matters

What is Identity-First Security? Benefits & Implementation

INDUSTRY INSIGHTS

What is Identity-First Security? Benefits & Implementation

The Shift to Zero Trust: Revolutionizing NHI Security

INDUSTRY INSIGHTS

The Shift to Zero Trust: Revolutionizing NHI Security

What Are Non-Human Identities? Examples & Use Cases

INDUSTRY INSIGHTS

What Are Non-Human Identities? Examples & Use Cases

Executive Order 14144: Redefining Non-Human Identity Security for the Modern Enterprise

INDUSTRY INSIGHTS

Executive Order 14144: Redefining Non-Human Identity Security for the Modern Enterprise

Clutch Security Raises $20M Series A to Lead the Charge in Non-Human Identity Security

COMPANY NEWS

Clutch Security Raises $20M Series A to Lead the Charge in Non-Human Identity Security

Clutch x Tines: Revolutionizing NHI Security with Seamless Automation

COMPANY NEWS

Clutch x Tines: Revolutionizing NHI Security with Seamless Automation

Why Non-Human Identities Are Key to a Zero Trust Strategy

INDUSTRY INSIGHTS

Why Non-Human Identities Are Key to a Zero Trust Strategy

The Importance of Identity Lineage™ in NHI Security

INDUSTRY INSIGHTS

The Importance of Identity Lineage™ in NHI Security

Uh Oh(Auth): Lessons from the Recent CyberHaven Incident

BREACH ANALYSIS

Uh Oh(Auth): Lessons from the Recent CyberHaven Incident

Clutch x Torq: Supercharging NHI Security for the Modern SOC

COMPANY NEWS

Clutch x Torq: Supercharging NHI Security for the Modern SOC

Shattering the Rotation Illusion: Part 6 - The Attacker’s Perspective & Introducing AWSKeyLockdown

TECH RESEARCH

Shattering the Rotation Illusion: Part 6 - The Attacker’s Perspective & Introducing AWSKeyLockdown

Shattering the Rotation Illusion: Part 5 - The Internet Archive Breach & An RDS Bonus

TECH RESEARCH

Shattering the Rotation Illusion: Part 5 - The Internet Archive Breach & An RDS Bonus

Shattering the Rotation Illusion: Part 4 - Developer Forums

TECH RESEARCH

Shattering the Rotation Illusion: Part 4 - Developer Forums

Shattering the Rotation Illusion: Part 3 - Code Snippets & Sharing Platforms

TECH RESEARCH

Shattering the Rotation Illusion: Part 3 - Code Snippets & Sharing Platforms

Shattering the Rotation Illusion: Part 2 - Package Managers

TECH RESEARCH

Shattering the Rotation Illusion: Part 2 - Package Managers

Shattering the Rotation Illusion: Part 1 - Code Hosting & Version Control Platforms

TECH RESEARCH

Shattering the Rotation Illusion: Part 1 - Code Hosting & Version Control Platforms

The Day We Unveiled the Secret Rotation Illusion

TECH RESEARCH

The Day We Unveiled the Secret Rotation Illusion

Introducing the Clutch Security VSCode Extension: Secret Scanning at the Source

TECH RESEARCH

Introducing the Clutch Security VSCode Extension: Secret Scanning at the Source

GitHub Steps Up Its NHI Monitoring Game

TECH RESEARCH

GitHub Steps Up Its NHI Monitoring Game

Simplifying Secrets Management, but at a Cost: A Deep Dive into AWS Secrets Manager Agent

TECH RESEARCH

Simplifying Secrets Management, but at a Cost: A Deep Dive into AWS Secrets Manager Agent

Token Trouble: How a Malicious Update Brought Crypto Mining to Lottie Player Users

BREACH ANALYSIS

Token Trouble: How a Malicious Update Brought Crypto Mining to Lottie Player Users

Tokens Gone Wild: Inside the Internet Archive's Two-Year Exposure

BREACH ANALYSIS

Tokens Gone Wild: Inside the Internet Archive's Two-Year Exposure

The Modern Workforce is Non-Human: Why Agentic AI Will Change Everything

INDUSTRY INSIGHTS

The Modern Workforce is Non-Human: Why Agentic AI Will Change Everything

Stop Rotating Secrets: How Frequent Key Changes Undermine Modern Security

INDUSTRY INSIGHTS

Stop Rotating Secrets: How Frequent Key Changes Undermine Modern Security

Introducing the NHI Index: A Centralized Resource for Securing Non-Human Identities

TECH RESEARCH

Introducing the NHI Index: A Centralized Resource for Securing Non-Human Identities

Future-Proofing Financial Institutions: Non-Human Identity Security Under DORA

INDUSTRY INSIGHTS

Future-Proofing Financial Institutions: Non-Human Identity Security Under DORA

The Map is Not The Territory: Transcending Fixed Security Landscapes

INDUSTRY INSIGHTS

The Map is Not The Territory: Transcending Fixed Security Landscapes

The Booming NHI Landscape: From Secret Sprawl to NHI Sprawl

INDUSTRY INSIGHTS

The Booming NHI Landscape: From Secret Sprawl to NHI Sprawl

Introducing Clutch: Revolutionizing Non-Human Identity Security

COMPANY NEWS

Introducing Clutch: Revolutionizing Non-Human Identity Security

The Genesis of Clutch: A Founder’s Perspective

COMPANY NEWS

The Genesis of Clutch: A Founder’s Perspective

Unveiling the Evolution: The Transformation of Non-Human Identities in the Enterprise World

INDUSTRY INSIGHTS

Unveiling the Evolution: The Transformation of Non-Human Identities in the Enterprise World

The Sisense Breach: An Incident Response Angle

BREACH ANALYSIS

The Sisense Breach: An Incident Response Angle

Dropbox Sign: Compromised Non-Human Identity Leads to Customer Data Breach

BREACH ANALYSIS

Dropbox Sign: Compromised Non-Human Identity Leads to Customer Data Breach

The New York Times Exposed GitHub Token Breach

BREACH ANALYSIS

The New York Times Exposed GitHub Token Breach

Human vs Non-Human Identities: A Comparison for Security Professionals - Part II

INDUSTRY INSIGHTS

Human vs Non-Human Identities: A Comparison for Security Professionals - Part II

Human vs Non-Human Identities: A Comparison for Security Professionals - Part I

INDUSTRY INSIGHTS

Human vs Non-Human Identities: A Comparison for Security Professionals - Part I