Adam Cheriki, Co-founder & CTO, Entro
Analysis of the Shai Hulud 2.0 npm attack that exposed millions of secrets. See what leaked, which NHIs were compromised, and how Entro helps prevent future waves.
Christopher Cutajar, Principal Information Security Engineer, Elastic
Guest blog from an Entro customer’s perspective.
Meital Tohar, Product Manager
With Entro Custom Detections, security teams can now define their own detectors for bespoke secrets, esoteric new tokens and even DLP phrases, and deploy them immediately across every integrated surface of the platform: code repositories, CI/CD logs, Slack, Jira, SharePoint, ServiceNow, MCP servers and more.
Itzik Alvas. Co-founder & CEO, Entro
With standards like the Model Context Protocol (MCP) accelerating adoption, engineering teams have democratized a new super-tool: AI agents. At unprecedented speed, agents are compounding the very risks we set out to solve, multiplying NHIs, amplifying entitlements, and exposing secrets at an unprecedented pace. It was time for us to take action
Peleg Cabra, Director of Product Marketing
SharePoint to SecretPoint: Entro Labs uncovers how OneDrive auto-sync drives 20% of enterprise secret leaks, and how to stop it.
Adam Cheriki, Co-founder & CTO, Entro
Salesforce customers woke up to another supply-chain nightmare this week: data theft campaigns exploiting OAuth tokens from the Drift AI chat integration provided by Salesloft.
Itzik Alvas. Co-founder & CEO, Entro
On July 28, 2025, OWASP released version 1.0 of its Securing Agentic Applications Guide, offering fresh security guidance for large language model agents and agentic workflows. Check out our key practical takeaways for AppSec teams working with non‑human identities and secrets to enable Agentic AI in production.
Peleg Cabra, Director of Product Marketing
In the first half of 2025, Entro Labs, analyzed millions of Non-Human Identities and exposed secrets. Here are our key takeaways
Adam Cheriki, Co-founder & CTO, Entro
The growing adoption of AI agents has stirred conversations about workforce reductions, restructuring, and human cost. But buried beneath the surface of every major layoff or merger is a quieter, growing security threat: the non-human identities (NHIs) that stay behind.
Peleg Cabra, Director of Product Marketing
AWS announced the availability of API keys for Amazon Bedrock. Great for developers, but what does this mean for your security?
Itzik Alvas. Co-founder & CEO, Entro
Every compliance framework demands rigorous controls, regular audits, and documented accountability, yet somehow NHIs slip through the cracks
Peleg Cabra, Director of Product Marketing
In this follow-up blog, we’ll show how Entro integrates with ServiceNow to scan, contextualize and remediate exposed secrets and non-human identities before they become a breach.
Peleg Cabra, Director of Product Marketing
Real Incidents & Lessons Learned
Itzik Alvas. Co-founder & CEO, Entro
Learn about Entro’s latest integration with Wiz!
Nir Cohen, Senior Product Manager
In most enterprises, the ownership of a leaked secret or NHI at risk, still remains unknown. Learn how Entro’s Ownership Attribution Model helps
Itzik Alvas. Co-founder & CEO, Entro
The Verizon Data Breach Investigations Report is live! Here are some of our key takeaways.
Adam Cheriki, Co-founder & CTO, Entro
MCP protocol provides a standard way for AI models to connect with external systems. But what does this mean for your non-human identities? Find out.
Peleg Cabra, Director of Product Marketing
In this blog, we’ll take a deeper look into the three core elements that make up a non-human identity : Consumers, Secrets, and Entitlements. Understanding these components and how they work together is key to securing NHIs and closing off attack paths before they’re exploited.
Peleg Cabra, Director of Product Marketing
LLMjacking attacks focus on exploiting non-human identities, the machine accounts and secrets that make generative AI services go round. Learn more in this blog.
Itzik Alvas. Co-founder & CEO, Entro
Agentic AI is already transforming how organizations build software and automate decision-making. In this blog, we share our top 3 takeaways based on the OWASP Security Research.
Entro Labs
In part 3 of our NHI Threats & Mitigation series, Entro Labs dives into idle secrets and NHIs, how to find them and properly rotate, as well as best practices moving forward.
Entro Labs
In part 2 of our NHI Threats & Mitigation series, Entro Labs dives into overprivileged NHI and a new phenomenon we’re calling “Super NHIs”
Itzik Alvas. Co-founder & CEO, Entro
As the first and only company integrated with Google Workspace, the Entro platform now takes non-human identity management to the next level.
Entro Labs
Non-Human Identities (NHIs) and secrets are a fundamental part of modern IT environments – making it one of the largest targets for attacks.
Adam Cheriki, Co-founder & CTO, Entro
Non-human identities have become the silent majority in enterprise environments – but where do you even start with finding them?
Itzik Alvas. Co-founder & CEO, Entro
The days of phishing attacks just compromising credit cards and passwords are over. They’re now after much bigger fish – your NHIs
Itzik Alvas. Co-founder & CEO, Entro
Here are the key predictions and recommendations for CISOs as we navigate the changing cyber landscape for 2025.
Itzik Alvas. Co-founder & CEO, Entro
IAST and RASP are undoubtedly powerful in their own domains, but they fall short when it comes to offering 360-degree management of non-human identities.
Itzik Alvas. Co-founder & CEO, Entro
From scanning to posture management – how to remediate NHIs throughout their lifecycle, step by step.
Itzik Alvas. Co-founder & CEO, Entro
2025 is coming, are you ready? In this blog we highlight 3 topics that must be on your radar moving forward.
Adam Cheriki, Co-founder & CTO, Entro
As organizations work to meet the requirements of PCI DSS, securing non-human identities should be viewed as an integral part of their overall security strategy. Learn the best practices
Itzik Alvas. Co-founder & CEO, Entro
Learn about the differences between human and non-human identities in security management and strategies for effectively managing NHIs to enhance security.
Adam Cheriki, Co-founder & CTO, Entro
In today’s increasingly automated world, securing non-human identities is not just a technical challenge but a fundamental requirement for achieving SOC 2 compliance.
Adam Cheriki, Co-founder & CTO, Entro
Securing non-human identities is an often-overlooked but critical aspect of ISO 27001 compliance. These identities—used by systems, applications, and services—have access to sensitive data and critical infrastructure, making them prime targets for attackers. Learn how to stay compliant & protected.
Itzik Alvas. Co-founder & CEO, Entro
As organizations increasingly rely on automated and autonomous systems, the attack surface for non-human identities is growing, and cybersecurity strategies must evolve accordingly. That’s why we created Non-Human Identity Detection and Response (NHIDR).
Itzik Alvas. Co-founder & CEO, Entro
Entro joins the Silverfort ISA to enhance Identity Security.
Adam Cheriki, Co-founder & CTO, Entro
Entro identifies challenges and risks in non human identity management within the Salesforce ecosystem and offers solutions
Itzik Alvas. Co-founder & CEO, Entro
Entro secures NHIs and Secrets by continuously monitoring Teams channels for exposed secrets and providing immediate mitigation steps.