Read the latest about compliance & security

Learn from experts, understand everything you need to know about compliance, and find answers to your pressing security questions.

API Keys Traded on the Dark Web: Hackers's New Target
8 min read

API Keys Traded on the Dark Web: Hackers's New Target

Hackers don't break in anymore—they buy API keys on the dark web. Why NHI security matters now.

Ben Kim
Ben Kim
CEO | Founder
API Keys Traded on the Dark Web: Hackers's New Target
A Study on Secret Exposure Cases within Vercel Environment Frontend Code: AWS, Stripe, Github Keys Were Exposed
Apr 27, 2025

A Study on Secret Exposure Cases within Vercel Environment Frontend Code: AWS, Stripe, Github Keys Were Exposed

Research on Vercel environments finds critical secrets like AWS/Stripe keys exposed in frontend code. Learn risks, causes, and prevention.

Ben Kim
Ben Kim
CEO | Founder
OWASP NHI5:2025 - Overprivileged NHI In-Depth Analysis and Management
Apr 25, 2025

OWASP NHI5:2025 - Overprivileged NHI In-Depth Analysis and Management

Deep dive into OWASP NHI5 Overprivileged NHIs & AI. Learn causes, risks, detection, and mitigation strategies like CIEM, PaC, and JIT access.

Ben Kim
Ben Kim
CEO | Founder
Beyond Lifecycle Management: Why Continuous Secret Detection is Non-Negotiable for NHI Security
Apr 23, 2025

Beyond Lifecycle Management: Why Continuous Secret Detection is Non-Negotiable for NHI Security

Traditional NHI controls like rotation aren't enough. Discover why proactive, continuous secret detection is essential for securing modern infrastructure.

Ben Kim
Ben Kim
CEO | Founder
OWASP NHI4:2025 Insecure Authentication Deep Dive Introduction: The Era of Non-Human Identities Beyond Humans
Apr 22, 2025

OWASP NHI4:2025 Insecure Authentication Deep Dive Introduction: The Era of Non-Human Identities Beyond Humans

Deep dive into OWASP NHI4: Insecure Authentication. Understand the risks of NHIs, key vulnerabilities, and how Zero Trust helps protect your systems.

Ben Kim
Ben Kim
CEO | Founder
Secret Sprawl and Non-Human Identities: The Growing Security Challenge
Apr 18, 2025

Secret Sprawl and Non-Human Identities: The Growing Security Challenge

Discover NHI sprawl vulnerabilities and how Cremit's detection tools safeguard your organization from credential exposure. Learn to manage NHI risks.

Ben Kim
Ben Kim
CEO | Founder
Navigating the Expanding AI Universe: Deepening Our Understanding of MCP, A2A, and the Imperative of Non-Human Identity Security
Apr 16, 2025

Navigating the Expanding AI Universe: Deepening Our Understanding of MCP, A2A, and the Imperative of Non-Human Identity Security

Delve into AI protocols MCP & A2A, their potential security risks for AI agents, and the increasing importance of securing Non-Human Identities (NHIs).

Ben Kim
Ben Kim
CEO | Founder
Stop Secrets Sprawl: Shifting Left for Effective Secret Detection
Apr 14, 2025

Stop Secrets Sprawl: Shifting Left for Effective Secret Detection

Leaked secrets threaten fast-paced development. Learn how Shift Left security integrates early secret detection in DevOps to prevent breaches & cut costs.

Ben Kim
Ben Kim
CEO | Founder
Hidden Dangers: Why Detecting Secrets in S3 Buckets is Critical
Apr 14, 2025

Hidden Dangers: Why Detecting Secrets in S3 Buckets is Critical

Learn critical strategies for detecting secrets in S3 buckets. Understand the risks of exposed NHI credentials & why proactive scanning is essential.

Ben Kim
Ben Kim
CEO | Founder
OWASP NHI2:2025 Secret Leakage – Understanding and Mitigating the Risks
Apr 4, 2025

OWASP NHI2:2025 Secret Leakage – Understanding and Mitigating the Risks

NHI2 Secret Leakage: Exposed API keys and credentials threaten your business. Learn how to prevent unauthorized access, data breaches, and system disruption.

Ben Kim
Ben Kim
CEO | Founder
Stop the Sprawl: Introducing Cremit’s AWS S3 Non-Human Identity Detection
Apr 1, 2025

Stop the Sprawl: Introducing Cremit’s AWS S3 Non-Human Identity Detection

Cremit Launches AWS S3 Non-Human Identity (NHI) Detection to Boost Cloud Security

Ben Kim
Ben Kim
CEO | Founder
Human vs. Non-Human Identity: The Key Differentiators
Mar 25, 2025

Human vs. Non-Human Identity: The Key Differentiators

Explore the critical differences between human and non-human digital identities, revealing hidden security risks and the importance of secret detection.

Ben Kim
Ben Kim
CEO | Founder
Build vs. Buy: Making the Right Choice for Secrets Detection
Mar 18, 2025

Build vs. Buy: Making the Right Choice for Secrets Detection

Build vs. buy secrets detection: our expert guide compares costs, features, and ROI for in-house and commercial security platforms.

Ben Kim
Ben Kim
CEO | Founder
OWASP NHI3:2025 - Vulnerable Third-Party NHI
Mar 18, 2025

OWASP NHI3:2025 - Vulnerable Third-Party NHI

Discover the security risks of vulnerable third-party non-human identities (NHI3:2025) and learn effective strategies to protect your organization from this OWASP Top 10 threat.

Ben Kim
Ben Kim
CEO | Founder
Wake-Up Call: tj-actions/changed-files Compromised NHIs
Mar 18, 2025

Wake-Up Call: tj-actions/changed-files Compromised NHIs

Learn from the tj-actions/changed-files compromise: CI/CD non-human identity (NHI) security risks, secret theft, and proactive hardening.

Ben Kim
Ben Kim
CEO | Founder
Bybit Hack Analysis: Strengthening Crypto Exchange Security
Mar 3, 2025

Bybit Hack Analysis: Strengthening Crypto Exchange Security

Bybit hacked! $1.4B crypto currency stolen! Exploited Safe{Wallet}, API key leak, AWS S3 breach? Exchange security is at stake! Check your security now!

Ben Kim
Ben Kim
CEO | Founder
Rising Data Breach Costs: Secret Detection's Role
Feb 25, 2025

Rising Data Breach Costs: Secret Detection's Role

Learn about the growing financial impact of data breaches and how secret detection and cybersecurity strategies can safeguard your data and business.

Ben Kim
Ben Kim
CEO | Founder
OWASP NHI1:2025 Improper Offboarding- A Comprehensive Overview
Feb 18, 2025

OWASP NHI1:2025 Improper Offboarding- A Comprehensive Overview

Discover how improper offboarding exposes credentials, leading to vulnerabilities like NHI sprawl, attack surface expansion, and compliance risks.

Ben Kim
Ben Kim
CEO | Founder
Behind the Code: Best Practices for Identifying Hidden Secrets
Feb 18, 2025

Behind the Code: Best Practices for Identifying Hidden Secrets

Improve code security with expert secret detection methods. Learn strategies to safeguard API keys, tokens, and certificates within your expanding cloud infrastructure.

Ben Kim
Ben Kim
CEO | Founder
Understanding the OWASP Non-Human Identities (NHI) Top 10 Threats
Feb 4, 2025

Understanding the OWASP Non-Human Identities (NHI) Top 10 Threats

Understanding NHI OWASP Top 10: risks to non-human identities like APIs and keys. Covers weak authentication, insecure storage, and more.

Ben Kim
Ben Kim
CEO | Founder
Securing Your Software Pipeline: The Role of Secret Detection
Feb 4, 2025

Securing Your Software Pipeline: The Role of Secret Detection

Prevent secret leaks in your software pipeline. Discover how secret detection improves security, safeguards CI/CD, and prevents credential exposure.

Ben Kim
Ben Kim
CEO | Founder
What Is Secret Detection? A Beginner’s Guide
Jan 17, 2025

What Is Secret Detection? A Beginner’s Guide

Cloud security demands secret detection. Learn its meaning and why it's essential for protecting sensitive data in today's cloud-driven organizations.

Ben Kim
Ben Kim
CEO | Founder
Vigilant Ally: Helping Developers Secure GitHub Secrets
Dec 3, 2024

Vigilant Ally: Helping Developers Secure GitHub Secrets

The Vigilant Ally Initiative supports developers secure API keys, tokens, and credentials on GitHub, promoting secure coding and secrets management.

Ben Kim
Ben Kim
CEO | Founder
Cremit Joins AWS SaaS Spotlight Program
Nov 6, 2024

Cremit Joins AWS SaaS Spotlight Program

Cremit joins the AWS SaaS Spotlight Program to gain insights through mentorship and collaboration, driving innovation in AI-powered security solutions.

Ben Kim
Ben Kim
CEO | Founder
DevSecOps: Why start with Cremit
Apr 28, 2024

DevSecOps: Why start with Cremit

DevSecOps is security into development, improving safety with early vulnerability detection, remediation, and compliance, starting with credential checks.

Ben Kim
Ben Kim
CEO | Founder
Credential Leakage Risks Hiding in Frontend Code
Apr 19, 2024

Credential Leakage Risks Hiding in Frontend Code

Learn why credentials like API keys and tokens are critical for access control and the risks of exposure to secure your applications and systems effectively.

Ben Kim
Ben Kim
CEO | Founder
Introducing Probe! Cremit's New Detection Engine
Apr 9, 2024

Introducing Probe! Cremit's New Detection Engine

Probe detects exposed credentials and sensitive data across cloud tools, automating validation and alerts, with AI-powered scanning for enhanced security.

Ben Kim
Ben Kim
CEO | Founder
Customer Interview: Insights from ENlighten
Feb 26, 2024

Customer Interview: Insights from ENlighten

We interviewed Jinseok Yeo from ENlighten, Korea’s top energy IT platform, on how they secure credentials and secrets. Here’s their approach to security.

Ben Kim
Ben Kim
CEO | Founder
6 Essential Practices for Protecting Non-Human Identities
Feb 25, 2024

6 Essential Practices for Protecting Non-Human Identities

Safeguard your infrastructure: Learn 6 best practices to protect API keys, passwords & encryption keys with secure storage, access controls & rotation.

Ben Kim
Ben Kim
CEO | Founder
Microsoft Secrets Leak: A Cybersecurity Wake-Up Call
Oct 22, 2023

Microsoft Secrets Leak: A Cybersecurity Wake-Up Call

See how an employee error at Microsoft led to the exposure of sensitive secrets and 38 terabytes of data.

Ben Kim
Ben Kim
CEO | Founder