ConductorOne Blog
The latest news and insights from the ConductorOne team
Stay up on the latest from ConductorOne
-
SOC2 and Least Privilege Access Control
·Alex BoveeLeast privilege access control has become the guiding principle for granting ass for SOC 2 compliance, but it can seem daunting to tackle this challenge with so much gray area. Learn how can you practically implement least privilege access controls.Read More -
When Threat Models Collide
·Paul QuernaInsider and outsider threats are starting to look the same - hackers are stealing identities or logged in sessions. Our approach to a solution? A pragmatic least privilege maturity curve.Read More -
ChatGPT and How AI will Impact Security
·Alex BoveeThoughts on ChatGPT, AI, and the long ranging security impacts - especially to phishing and social engineering based attacks.Read More -
Baton and the Journey to Identity Security and Unified Access Control
·Alex BoveeTo realize our vision of securing workforce identity, we needed to be able to connect to any technology, anywhere – and this required a new approach. Baton is our answer.Read More -
Technical Deep Dive: Using Baton to Audit Infrastructure Access
·John DegnerGetting started with Baton: how to extract, normalize, and interact with identity data using open source Baton connectors.Read More -
Announcing Baton, an Open Source Toolkit for Auditing Infrastructure User Access
·Paul QuernaAnnouncing Baton, the first open source toolkit to extract, normalize, and interact with identity data from any app, with a standardized but extensible data model.Read More -
Achieve Least Privilege Access with ConductorOne + Okta
·Samira KahangiLearn how organizations using Okta can supercharge their IAM security strategy and achieve least privilege access with ConductorOneRead More -
How to Be SOC2 Compliant: A Checklist for Security Teams
·Shanelle RuckerYour first SOC2 audit can seem daunting. Use this checklist to build a strong security strategy that will put you on the right path to compliance.Read More -
Birthright Access is Broken
·Alex BoveeBirthright access is an anti-pattern for secure, least privilege access control.Read More -
Running Your UAR Campaigns: Product Deep Dive
·Marissa EndresFollowing our last post on scoping UARs with ConductorOne, today we're diving into running the campaign, the reviewer experience, and reporting out to auditors.Read More