![Astrix Security Profile](https://pbs.twimg.com/profile_images/1499113170102734848/n0hpbsGy_x96.jpg)
Astrix Security
@AstrixSecurity
Followers
140
Following
21
Statuses
99
Access management for third-party integrations
Tel Aviv, Israel
Joined January 2022
Reflection on the past months brought up a crazy highlight - the @RSAConference Innovation Sandbox contest. ๐ Last April, Astrix CEO Alon Jackson took the stage to tell the story of Astrix in front of over 2000 people, and what a wild ride it was. ๐
0
0
3
Astrix isย #hiringย ๐คธโโ๏ธ ๐๐๐ฅ๐๐ฌ & ๐๐ฎ๐ฌ๐ญ๐จ๐ฆ๐๐ซ ๐๐ฎ๐๐๐๐ฌ๐ฌ: SDR Senior Account Executive Senior Sales Engineer Senior Customer Success ๐๐๐ซ๐ค๐๐ญ๐ข๐ง๐ : Senior Demand Generation ๐&๐: Senior Backend Senior Full Stack Seniorย DevOps Apply here
0
1
5
๐ป Beware of ghosts at this year's #DefCon31 ๐ป We're excited to announce that the Ghost Token 0-day vulnerability has made it to DefCon! On August 11, our Research Team Lead @TalSkverer will take the stage to share the ins and outs of the #GhostToken vulnerability.
1
3
6
Next on Astrix's summer tour - #BlackHat USA! ๐ธ Come meet our vibrant team at our Startup City booth SC621 and get your piece of the non-human identities action. You can expect next-level swag, meaningful conversations and delicious cookies. ๐ฝ ๐ช
0
1
2
In case you missed it, last week we announced our $25M Series A fundraising & the excitement has not stopped since! ๐With extensive coverage from leading outlets like @Forbes & @TechCrunch, we couldn't be more thrilled to continue growing and supporting our incredible customers.
0
1
6
Astrix raises $25M series A!๐This new investment brings Astrixโs total funding to almost $40 million and is led by @CRV with participation from existing investors @BessemerVP and @F2_Capital ๐ฝ
0
3
11
Our CEO Alon Jackson's latest article for @Forbes highlights the risks posed by #ShadowConnections, and why it's time to shift our perspective and secure third-party applications alongside core systems. Read the full piece here:
0
2
4
๐ณ๏ธโ๐ ๐๐ฅ๐ฅ ๐ก๐ฎ๐ฆ๐๐ง๐ฌ ๐๐ซ๐ ๐๐จ๐ซ๐ง ๐๐ช๐ฎ๐๐ฅ* Join us as we celebrate #PrideMonth and continue to support and cherish equality and freedom for everybody. *๐๐ฐ๐ฏ-๐ฉ๐ถ๐ฎ๐ข๐ฏ ๐ช๐ฅ๐ฆ๐ฏ๐ต๐ช๐ต๐ช๐ฆ๐ด ๐ฆ๐น๐ค๐ญ๐ถ๐ฅ๐ฆ๐ฅ ๐ฝ
2
4
8
๐๐จ๐ฆ๐ ๐ฏ๐ข๐ฌ๐ข๐ญ ๐ฎ๐ฌ ๐๐ญ ๐๐ฒ๐๐๐ซ๐ฐ๐๐๐ค ๐๐๐! We're super excited to be exhibiting at the Startup Exhibition area on Tuesday, June 27. Let's meet and chat about all things non-human identities! ๐ฝ #CyberWeek2023 #CyberWeekTLV
0
2
6
๐ Non-human Identity Threats - The Top Three๐Check out our CTO's new article in @securitymag, revealing the three main techniques attackers leverage to exploit unmonitored and improperly secured API keys, OAuth tokens, and service accounts.
0
3
7
According to the Cloud Security Alliance report, insufficient identity, credentials, access, and key management is one of the top threats to cloud computing. #CSA sheds light on what these risks mean and shares its recommendations for mitigation.
0
1
1
According to April's #GCP Threat Horizons report - Leaked, or inadvertently shared, service account credentials continue to be one of the leading factors of abuse in Google Cloud. To learn more about this threat, check out the full chapter on page 19:
0
0
1
Last week we had the pleasure of hosting the top #CISOs and security executives in the tech industry for an intimate breakfast. It was a morning full of insightful conversations and networking among friends and colleagues. Until next time with The #AstrixBreakfastClub! โ๏ธ๐ณ
0
1
2
Our CEO Alon Jackson shared his insights on the new generation of supply chain attacks that leverage non-human connections to infiltrate's companies' most sensitive core systems in an interview for @BetaNews. Read the full interview:
0
1
1
@AstrixSecurity discovers 0-Day Vulnerability in Google Cloud Platform. The flaw, dubbed โGhostToken,โ enables hidden and unremovable access to a victimโs Google account via third-party applications.
0
3
2
On the page, you'll find: ๐ก๏ธ A dashboard overview ๐ก๏ธ Connectivity map showing potential risks ๐ก๏ธ Information on how to gain visibility, detect threats, remediation, and lifecycle management ๐ #App2AppSecurity #ThirdPartySecurity #SupplyChainSecurity
0
0
0