<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Blog on ConductorOne</title><link>https://www.conductorone.com/blog/</link><description>Recent content in Blog on ConductorOne</description><generator>Hugo</generator><language>en-us</language><copyright>&lt;p>&amp;copy; Copyright ConductorOne Inc.&lt;/p></copyright><atom:link href="https://www.conductorone.com/blog/index.xml" rel="self" type="application/rss+xml"/><item><title>Three Properties Identity Must Have in the Agentic Era</title><link>https://www.conductorone.com/blog/three-properties-identity-must-have-in-the-agentic-era/</link><pubDate>Thu, 12 Mar 2026 07:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/three-properties-identity-must-have-in-the-agentic-era/</guid><description>&lt;p>&lt;em>We couldn&amp;rsquo;t manage identity for humans. Now every human has 17 agents, and those agents are creating agents of their own.&lt;/em>&lt;/p>
&lt;p>Here is the uncomfortable truth about identity and access management: we were already losing before AI agents arrived.&lt;/p></description></item><item><title>Your AI Strategy Has a Blind Spot</title><link>https://www.conductorone.com/blog/your-ai-strategy-has-a-blind-spot/</link><pubDate>Sun, 08 Mar 2026 07:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/your-ai-strategy-has-a-blind-spot/</guid><description>&lt;p>Technical teams are already deep into AI. Developers are shipping code with Cursor and Copilot, data engineers are building pipelines with agentic workflows, and security teams are experimenting with automated triage.&lt;/p></description></item><item><title>Access Management Needs a Conductor, Not More Instruments</title><link>https://www.conductorone.com/blog/access-management-needs-a-conductor/</link><pubDate>Wed, 04 Mar 2026 07:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/access-management-needs-a-conductor/</guid><description>&lt;p>&lt;em>Every employee now has an entourage of AI agents. The agents have agents of their own. And no one is on the podium.&lt;/em>&lt;/p>
&lt;p>An orchestra without a conductor is just noise.&lt;/p></description></item><item><title>February 2026 Product Wrap</title><link>https://www.conductorone.com/blog/february-2026/</link><pubDate>Mon, 02 Mar 2026 07:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/february-2026/</guid><description>&lt;p>February was about expanding what identity governance can control and how securely it can operate across both humans and machines. As organizations accelerate automation and adopt more AI-driven workflows, identity becomes more than access approvals and quarterly reviews. It becomes the control plane for secrets, service accounts, custom logic, and machine-driven actions.&lt;/p></description></item><item><title>Introducing Functions: Extend Identity Governance With Custom Code, Built Directly Into ConductorOne</title><link>https://www.conductorone.com/blog/introducing-functions/</link><pubDate>Wed, 25 Feb 2026 09:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/introducing-functions/</guid><description>&lt;p>Identity is never one size fits all.&lt;/p>
&lt;p>Every environment has edge cases. Every organization has unique governance logic. And no matter how flexible an identity platform is, there will always be scenarios where configuration alone is not enough.&lt;/p></description></item><item><title>How RRCU Uses ConductorOne Automations to Streamline Identity Operations</title><link>https://www.conductorone.com/blog/how-rrcu-uses-conductorone-automations/</link><pubDate>Mon, 23 Feb 2026 07:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/how-rrcu-uses-conductorone-automations/</guid><description>&lt;p>&lt;a href="https://www.conductorone.com/products/automations/" target="_blank" rel="noopener">Automations&lt;/a> are one of the most powerful parts of ConductorOne, turning identity governance from manual tasks into workflows that run continuously in the background. With simple if/then logic and real-time data from your identity provider, HR system, and apps, IT and security teams can trigger onboarding, role changes, reviews, and notifications automatically, no code required.&lt;/p></description></item><item><title>Your Enterprise Needs an Immune System, Not a Better Firewall</title><link>https://www.conductorone.com/blog/your-enterprise-needs-an-immune-system/</link><pubDate>Wed, 18 Feb 2026 07:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/your-enterprise-needs-an-immune-system/</guid><description>&lt;p>&lt;em>Identity and access management solves the same problem biology solved 500 million years ago. It&amp;rsquo;s time we built it that way.&lt;/em>&lt;/p>
&lt;p>Your body is managing 37 trillion cells right now. Each one carries molecular identity credentials. Each one gets continuously verified. Each one interacts with neighbors that could be allies or invaders.&lt;/p></description></item><item><title>Why IAM, IGA, and PAM Break in the Agentic Enterprise</title><link>https://www.conductorone.com/blog/why-iam-iga-and-pam-break-in-the-agentic-enterprise/</link><pubDate>Tue, 17 Feb 2026 01:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/why-iam-iga-and-pam-break-in-the-agentic-enterprise/</guid><description>&lt;p>The identity stack most enterprises rely on today (the alphabet soup of IAM, IGA, and PAM) was built for a world with humans in the center.&lt;/p>
&lt;p>IAM handled authentication and access for employees. PAM controlled privileged credentials for operators and admins. IGA sat alongside them to clean things up. Joiner, mover, leaver. Periodic access reviews. Compliance checks after the fact.&lt;/p></description></item><item><title>Defining the Agentic Enterprise</title><link>https://www.conductorone.com/blog/defining-the-agentic-enterprise/</link><pubDate>Wed, 11 Feb 2026 00:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/defining-the-agentic-enterprise/</guid><description>&lt;p>For the last twenty years, the enterprise has had a fairly stable shape.&lt;/p>
&lt;p>People sat behind laptops. Software lived in the cloud or on the network. We bought tools to make humans faster and more efficient at knowledge work. CRM, collaboration tools, ticketing systems, analytics dashboards, and identity systems existed to reduce friction for the person behind the keyboard.&lt;/p></description></item><item><title>What Identity Governance Looks Like When Automation Does the Work</title><link>https://www.conductorone.com/blog/what-identity-governance-looks-like-when-automation-does-the-work/</link><pubDate>Tue, 10 Feb 2026 07:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/what-identity-governance-looks-like-when-automation-does-the-work/</guid><description>&lt;p>For years, identity governance has been treated as a necessary interruption. Something teams pause to do. Quarterly reviews. Annual audits. Periodic cleanup.&lt;/p>
&lt;p>That model no longer fits how modern systems operate.&lt;/p></description></item><item><title>The Modern IGA RFP Guide: How to Choose the Right Identity Governance Platform in 2026</title><link>https://www.conductorone.com/blog/the-modern-iga-rfp-guide/</link><pubDate>Mon, 09 Feb 2026 07:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/the-modern-iga-rfp-guide/</guid><description>&lt;p>Looking for an IGA solution can feel overwhelming. There’s too many options, lots of flashy features, and everyone claiming to be the best choice. But here’s the thing: choosing the wrong IGA solution can have a negative impact on your entire organization’s security and productivity.&lt;/p></description></item><item><title>Meet Automations Architect: Build Automated Workflows in Minutes</title><link>https://www.conductorone.com/blog/meet-automations-architect/</link><pubDate>Fri, 06 Feb 2026 09:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/meet-automations-architect/</guid><description>&lt;p>&lt;a href="https://www.conductorone.com/products/automations/" target="_blank" rel="noopener">Automations&lt;/a> are one of the most powerful parts of ConductorOne. They are how teams turn identity policy into action: joiner-mover-leaver flows, unused access cleanup, and proactive alerting that keep orgs secure every day.&lt;/p></description></item><item><title>The IGA Maturity Curve: Shifting from Reviews to Assurance</title><link>https://www.conductorone.com/blog/iga-maturity-curve-treasure-data-webinar-recap/</link><pubDate>Fri, 06 Feb 2026 07:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/iga-maturity-curve-treasure-data-webinar-recap/</guid><description>&lt;h2 id="the-iga-maturity-curve-shifting-from-reviews-to-assurance" class="group">
 &lt;span class="text-black">&lt;strong>The IGA Maturity Curve: Shifting from Reviews to Assurance&lt;/strong>&lt;/span>
 &lt;a href="#the-iga-maturity-curve-shifting-from-reviews-to-assurance" aria-label="Link to section" class="relative inline-block w-6 text-gray-500 no-underline transition-opacity duration-75 opacity-0 group-hover:opacity-100 group-hover:text-violet aspect-square" data-tippy-content="Copy section link to clipboard">
 &lt;svg viewBox="0 0 35 28" fill="none" xmlns="http://www.w3.org/2000/svg">
 &lt;path d="M11.9284 13.8081L4.16619 10.1453C3.07968 9.63204 2.25981 8.72551 1.8532 7.58901C1.4466 6.45584 1.50658 5.23602 2.01651 4.15619C2.52976 3.07635 3.43629 2.25647 4.57612 1.84986C5.71595 1.44326 6.93912 1.49991 8.02229 2.01317L17.7842 6.61915C19.2939 7.33238 20.2805 8.81549 20.3604 10.4919C20.3804 10.9285 20.7504 11.2651 21.187 11.2451C21.6236 11.2251 21.9602 10.8552 21.9402 10.4186C21.8336 8.15559 20.4971 6.15255 18.4574 5.18936L8.69551 0.583383C7.22906 -0.109847 5.57598 -0.186503 4.03955 0.360083C2.50311 0.910001 1.27662 2.0165 0.583387 3.47962C-0.109843 4.94273 -0.186505 6.58916 0.36008 8.12226C0.909998 9.6587 2.01985 10.8852 3.48963 11.5784L11.2518 15.2412C11.3618 15.2912 11.4751 15.3179 11.5884 15.3179C11.885 15.3179 12.1683 15.1512 12.305 14.8646C12.4916 14.4647 12.3216 13.9947 11.9284 13.8081Z" fill="currentColor"/>
 &lt;path d="M20.4737 13.4082C20.1337 13.1315 19.6371 13.1815 19.3605 13.5215C18.3407 14.7713 16.7176 15.3845 15.1212 15.1246C14.6912 15.0546 14.2846 15.3479 14.2113 15.7778C14.1413 16.2077 14.4346 16.6143 14.8645 16.6877C15.1911 16.741 15.5178 16.7677 15.8444 16.7677C17.6641 16.7677 19.4172 15.9544 20.5837 14.5247C20.8636 14.1814 20.8136 13.6848 20.4737 13.4082Z" fill="currentColor"/>
 &lt;path d="M33.8986 19.6007C33.3487 18.0642 32.2388 16.8378 30.769 16.1445L21.0072 11.5385C19.5407 10.8453 17.8876 10.7687 16.3512 11.3152C14.8147 11.8652 13.5883 12.9717 12.895 14.4348C12.2018 15.8979 12.1252 17.5443 12.6717 19.0774C13.2217 20.6139 14.3315 21.8404 15.8013 22.5336L25.5631 27.1396C26.3864 27.5262 27.2662 27.7228 28.1528 27.7228C28.846 27.7228 29.5459 27.6028 30.2191 27.3629C31.7556 26.8129 32.982 25.7064 33.6753 24.2433C34.3685 22.7835 34.4485 21.1338 33.8986 19.6007ZM32.2455 23.5668C31.7322 24.6466 30.8257 25.4665 29.6859 25.8731C28.546 26.2797 27.3229 26.223 26.2397 25.7098L16.4778 21.1038C15.3913 20.5905 14.5714 19.684 14.1615 18.5475C13.7549 17.4143 13.8149 16.1945 14.3248 15.1147C14.8381 14.0348 15.7446 13.215 16.8844 12.8084C18.0243 12.4018 19.2474 12.4584 20.3306 12.9717L30.0925 17.5777C31.179 18.0909 31.9989 18.9974 32.4088 20.1339C32.8154 21.2671 32.7554 22.4869 32.2455 23.5668Z" fill="currentColor"/>
&lt;/svg>

 &lt;/a>
&lt;/h2>&lt;p>Manual user access reviews were built for a different era. Today, access changes constantly, risks emerge in real time, and identity has become central to how organizations operate securely at scale.&lt;/p></description></item><item><title>January 2026 Product Updates: Modern Identity at Scale</title><link>https://www.conductorone.com/blog/january-2026/</link><pubDate>Fri, 30 Jan 2026 07:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/january-2026/</guid><description>&lt;p>As we kicked off 2026, we focused on continuing to make identity easier for modern organizations.&lt;/p>
&lt;p>Identity today is no longer a set of static approvals and quarterly checkpoints. It is continuous, time-bound, and deeply tied to how work gets done across infrastructure, SaaS, and operations. This month’s updates reflect that shift—we focused on making identity governance more dynamic, more self-service, and more observable, while continuing to remove friction from everyday workflows.&lt;/p></description></item><item><title>Take Full Control of Identity Data with Advanced Attribute Mapping in Super Directory</title><link>https://www.conductorone.com/blog/advanced-attribute-matchings-with-super-directory/</link><pubDate>Tue, 27 Jan 2026 07:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/advanced-attribute-matchings-with-super-directory/</guid><description>&lt;p>Identity data rarely lives in a single system. Job titles, managers, emails, and identifiers are often spread across multiple apps, and they’re not always consistent. &lt;a href="https://www.conductorone.com/products/super-directory/" target="_blank" rel="noopener">Super Directory&lt;/a> gives you precise control over how those attributes are sourced and how users are matched across systems.&lt;/p></description></item><item><title>Why User Access Reviews Are Becoming a Relic of the Past</title><link>https://www.conductorone.com/blog/why-uars-are-becoming-a-relic-of-the-past/</link><pubDate>Tue, 20 Jan 2026 07:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/why-uars-are-becoming-a-relic-of-the-past/</guid><description>&lt;p>For years, user access reviews (UARs) have been treated as the centerpiece of identity governance.&lt;/p>
&lt;p>If you want to prove control, you run reviews. If you want to pass an audit, you document reviews. If something goes wrong, you point to the last completed review.&lt;/p></description></item><item><title>10 IGA Metrics Every Security Team Should Use to Measure Success</title><link>https://www.conductorone.com/blog/10-iga-metrics-every-security-team-should-use/</link><pubDate>Fri, 16 Jan 2026 00:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/10-iga-metrics-every-security-team-should-use/</guid><description>&lt;p>How do you know if your identity governance program is actually working? For many organizations, the answer is still framed around completion, not impact.&lt;br>Access reviews were launched, requests were processed, audits were passed, etc.&lt;/p></description></item><item><title>NIST’s New Cyber AI Profile Signals a Shift: AI Security Starts With Identity</title><link>https://www.conductorone.com/blog/nist-releases-cyber-ai-profile/</link><pubDate>Tue, 13 Jan 2026 07:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/nist-releases-cyber-ai-profile/</guid><description>&lt;p>As we head into 2026, AI systems are becoming embedded in core business operations, security tooling, and decision-making workflows across the enterprise.&lt;/p>
&lt;p>Recognizing this shift, the National Institute of Standards and Technology (NIST) recently released a &lt;em>preliminary draft&lt;/em> of its &lt;a href="https://nvlpubs.nist.gov/nistpubs/ir/2025/NIST.IR.8596.iprd.pdf" target="_blank" rel="noopener">Cybersecurity Framework Profile for Artificial Intelligence (NIST IR 8596)&lt;/a>, also known as the Cyber AI Profile.&lt;/p></description></item><item><title>Identity Becomes the Battlefield: 3 Cybersecurity Predictions for 2026</title><link>https://www.conductorone.com/blog/identity-becomes-the-battlefield-in-2026/</link><pubDate>Thu, 08 Jan 2026 07:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/identity-becomes-the-battlefield-in-2026/</guid><description>&lt;p>For years, cybersecurity has chased symptoms: malware, endpoints, networks, cloud misconfigurations. In 2026, the industry finally agrees on what’s actually been broken all along.&lt;/p>
&lt;p>&lt;strong>Identity.&lt;/strong>&lt;/p>
&lt;p>Identity as the control plane for access, trust, and risk. Here are three predictions for how identity security evolves—and accelerates—in 2026.&lt;/p></description></item><item><title>How Dynamic Access Enables Least Privilege</title><link>https://www.conductorone.com/blog/how-dynamic-access-enables-least-privilege/</link><pubDate>Fri, 02 Jan 2026 07:00:00 +0000</pubDate><guid>https://www.conductorone.com/blog/how-dynamic-access-enables-least-privilege/</guid><description>&lt;p>Most organizations still grant access using a static model. When someone joins the company, they get a predefined set of applications based on a single attribute, often their department.&lt;/p>
&lt;p>If you join Department A, you receive Applications 1, 2, and 3.&lt;br>If you join Department B, you receive Applications 1, 3, and 4.&lt;/p></description></item></channel></rss>