Blog
Security
/ 30 Mar, 2026Deepfake Impersonation Attacks (Part 2): Defending with SlashID Mutual TOTP
As generative AI makes deepfake impersonation attacks increasingly convincing, traditional enterprise security controls fail to protect human-to-human communication channels.
This post introduces SlashID Mutual TOTP, a cryptographic verification mechanism that replaces perception-based trust with mathematical proof of identity, stopping deepfake impersonation attacks before sensitive information is shared.

Security
/ 30 Mar, 2026Deepfake Impersonation Attacks (Part 2): Defending with SlashID Mutual TOTP
As generative AI makes deepfake impersonation attacks increasingly convincing, traditional enterprise security controls fail to protect human-to-human communication channels.
This post introduces SlashID Mutual TOTP, a cryptographic verification mechanism that replaces perception-based trust with mathematical proof of identity, stopping deepfake impersonation attacks before sensitive information is shared.
Security
/ 30 Sep, 2024Identity Security: The problem(s) with federation
Federating trust with an identity provider (IdP) is common practice to centralize identity governance.
However, attackers can exploit identity federation to breach organizations or maintain persistence in a system.
This blog post explores common attack vectors against federated identities and effective mitigation strategies.
Security
/ 16 Sep, 2024Non-Human Identities Security: Breaking down the problem
Compromised non-human identities are increasingly being leveraged by attackers to gain initial access and as a vector for lateral movement.
Microsoft, Cloudflare, and Dropbox are just a few of the companies that have fallen victim to this growing threat this year.
In this blog post, we focus on the attack vectors involved and on what actions companies must take to prevent these attacks.
New Feature
/ 26 Aug, 2024Detecting Man-in-the-Middle Attacks with SlashID
Detect when attackers access your website through malicious proxies with SlashID.
Deep Dives
/ 22 Aug, 2024A deep dive in the AWS credential leaks reported by Palo Alto Networks
Thousands of credentials were exfiltrated from exposed .env files in the latest large-scale attack uncovered by Palo Alto.
Protecting cloud services and non-human identities spread across many vendors and environments is now table-stakes: SlashID can help.
New Feature
/ 22 Jul, 2024SlashID RBAC: Globally-available role-based access control
SlashID RBAC is a globally replicated role-based access control system that allows you to restrict access to resources based on permissions assigned to specific persons.
In this post, we will show you how to use RBAC in SlashID, and how to create permissions, and roles, and assign them to persons.
Security
/ 15 Jul, 2024Protecting against Snowflake breaches
In the last few weeks several very high-profile breaches have been in the news, from Santander to Ticketmaster and AT&T.
These breaches all have the same attack vector: identity-based attacks against Snowflake instances.
In this article, we discuss the causes of the breach and our approach to protect against identity-based attacks against Snowflake.
New Feature
/ 24 Jun, 2024Introducing the SlashID Local Deployment
The SlashID local deployment is our answer for developers looking to build, run and test apps locally.
Local development with SlashID can be a good fit for your evaluation, prototyping, development, and continuous integration workflows.
Security
/ 17 Jun, 2024ODPR: A Framework for Securing Non-Human Identities
Identity-based attacks have become the primary way attackers move laterally in a network. They are also responsible for half of the initial intrusions.
Addressing these attacks requires very different tooling and approaches compared to malware-based attacks.
In this article we delve into the SlashID framework to address these attacks.
New Feature
/ 10 Jun, 2024Credential Tokenization: Protecting third-party API credentials
Stolen secrets and credentials are one of the most common ways for attackers to move laterally and maintain persistence in cloud environments.
In this blog post we introduce credential tokenization to protect secrets at runtime, introduce separation of duties, and reduce the credential rotation burden.