Beyond Checking the Box: How to Use UARs for Real Security
·Marcus WhitakerMost companies treat user access reviews (UARs) as a compliance checkbox, but that’s a missed opportunity. This blog explores how leading security teams use UARs to reduce risk, eliminate unused access, and enforce policies more effectively, with real-world examples you can implement today.Managing Identity for SQL-Powered Apps: No APIs Necessary
·Justin GallardoDiscover how Baton-SQL helps organizations integrate legacy and homegrown applications into their identity governance programs, no APIs or custom code required. Learn how our open-source connector enables fast, scalable access to identity and access data directly from any SQL database.How ConductorOne Built Guardrails Into Our AI Agents
·Paul QuernaGo behind the scenes of how we built guardrails into Thomas, ConductorOne’s AI agent—and the industry’s first multi-agent identity security platform. This blog breaks down our architecture, trust models, and sandboxing techniques that ensure agents can automate identity governance safely, securely, and transparently.The Cure for IGAD: Identity Governance Anxiety Disorder
·Claire McKennaAt ConductorOne, we talk to security and IT teams every day. And we’ve noticed a troubling trend. We’re not doctors, but the symptoms are hard to ignore. After years of watching identity pros suffer in silence, we’re finally giving the condition a name: Identity Governance Anxiety Disorder.Key Takeaways From the 2025 Future of Identity Security Report
·Claire McKennaThe 2025 Future of Identity Security Report reveals how security leaders are accelerating into an AI-driven era: embracing risk, scaling up identity budgets, and rethinking access for both humans and machines. Read on for key trends shaping the next wave of identity security.

Stay in touch
The best way to keep up with identity security tips, guides, and industry best practices.