Shine a light on shadow apps
  • images/screenshot-2023-03-30-at-1-01-43-pm.png

    The Great Convergence of IT and Security

    ·
    Paul Querna
    The lines between IT and Security are becoming increasingly indistinct. This convergence is fostering a new era of collaboration, adaptability, and shared responsibility. Hear our CTO Paul Querna's thoughts on this complex topic and his outlook on the future of the current security climate.
  • images/dosilekko_vector_art_style_image_that_visually_represents_the_c_148e620b-acfe-4e57-9e9b-b5530ae3160d.png

    Secrets, Key Rotation, and the Role of Automation

    ·
    Paul Querna
    Github's accidental leak of their SSH RSA server private key sheds light on security best practices. What can we do to prevent other such breaches and increase our security posture. Our CTO Paul Querna gives his take.
  • images/copy-of-c1-resource-graphics-17.png

    Continuing the Journey to Least Privilege: Introducing Access Requests

    ·
    Marissa Endres
    Introducing Access Requests: Self-service access requests for your employees via Slack or a web catalog, automatic approval routing, and just-in-time provisioning.
  • images/copy-of-c1-resource-graphics-11.png

    Reimagining Identity Governance

    ·
    Alex Bovee
    Alex Bovee had the opportunity to speak with Lisa Cook from ISACA to discuss all things identity. Hear the full recording and learn more about their views on modern businesses and bridging the gap between compliance measures and security outcomes.
  • images/copy-of-c1-resource-graphics-14.png

    How to Roll Out Passkeys and Block Phishing Attacks

    ·
    Alex Bovee
    Moving to phishing and social engineering proof authenticators is a must. One of the most effective ways to implement this is through physical passkeys. In this practical guide, learn more about the key steps to roll out physical passkeys for your company.
  • images/copy-of-c1-resource-graphics-15.png

    Making Sense of the Users, Accounts, and Access in your SaaS and IaaS Apps with a Unified Directory

    ·
    Alex Bovee
    We have taken identity a step further with our new feature - unified directories! Learn more about how this new feature provides a single, consolidated source of truth for all humans that interact with your organization.
  • images/shift-left-on-identity-travis-mcpeak-01.jpg

    Travis McPeak, CEO and Co-Founder of Resourcely, on Shifting DevSecOps Left and Making Developers More Productive

    ·
    Kate Cheney
    The first in our video interview series, Alex Bovee had the opportunity to talk with Travis McPeak about emerging trends in security, compliance, and platform engineering.
  • images/copy-of-c1-resource-graphics-13.png

    When Attacks Go … Well? Key Takeaways From the Reddit Hack

    ·
    Alex Bovee
    Phishing has become increasingly prevalent, as seen in Reddit's account compromise last week, and standing privileges and sensitive access pose significant risks. We need to shift to zero standing privileges to secure our access and infrastructure.
  • images/c1-perspectives.png

    SOC2 and Least Privilege Access Control

    ·
    Alex Bovee
    Least privilege access control has become the guiding principle for granting ass for SOC 2 compliance, but it can seem daunting to tackle this challenge with so much gray area. Learn how can you practically implement least privilege access controls.
images/newsletter-3.png

Stay in touch

The best way to keep up with identity security tips, guides, and industry best practices.