Shine a light on shadow apps
  • images/when-threat-models-collide.png

    When Threat Models Collide

    ·
    Paul Querna
    Insider and outsider threats are starting to look the same - hackers are stealing identities or logged in sessions. Our approach to a solution? A pragmatic least privilege maturity curve.
  • images/c1-perspectives.png

    ChatGPT and How AI will Impact Security

    ·
    Alex Bovee
    Thoughts on ChatGPT, AI, and the long ranging security impacts - especially to phishing and social engineering based attacks.
  • images/baton-launch-03.jpg

    Baton and the Journey to Identity Security and Unified Access Control

    ·
    Alex Bovee
    To realize our vision of securing workforce identity, we needed to be able to connect to any technology, anywhere – and this required a new approach. Baton is our answer.
  • images/copy-of-baton-launch-01-1.jpg

    Technical Deep Dive: Using Baton to Audit Infrastructure Access

    ·
    John Degner
    Getting started with Baton: how to extract, normalize, and interact with identity data using open source Baton connectors.
  • images/baton-launch-11.jpg

    Announcing Baton, an Open Source Toolkit for Auditing Infrastructure User Access

    ·
    Paul Querna
    Announcing Baton, the first open source toolkit to extract, normalize, and interact with identity data from any app, with a standardized but extensible data model.
  • images/c1-perspectives.png

    Achieve Least Privilege Access with ConductorOne + Okta

    ·
    Samira Kahangi
    Learn how organizations using Okta can supercharge their IAM security strategy and achieve least privilege access with ConductorOne
  • images/c1-perspectives.png

    How to Be SOC2 Compliant: A Checklist for Security Teams

    ·
    Shanelle Rucker
    Your first SOC2 audit can seem daunting. Use this checklist to build a strong security strategy that will put you on the right path to compliance.
  • images/c1-perspectives.png

    Birthright Access is Broken

    ·
    Alex Bovee
    Birthright access is an anti-pattern for secure, least privilege access control.
  • images/social-platfroms-access-reviews-features-01-1.png

    Running Your UAR Campaigns: Product Deep Dive

    ·
    Marissa Endres
    Following our last post on scoping UARs with ConductorOne, today we're diving into running the campaign, the reviewer experience, and reporting out to auditors.
images/newsletter-3.png

Stay in touch

The best way to keep up with identity security tips, guides, and industry best practices.