Shine a light on shadow apps
  • images/copy-of-c1-resource-graphics-34.png

    Redefining Identity Security: ConductorOne's Inclusion in the InfraRed 100

    ·
    Paul Querna
    We are thrilled to share that ConductorOne has been recognized as one of Redpoint Venture Capital's InfraRed 100 list.
  • images/blog-post-c1-news-social-1.png

    ConductorOne … 2.0: An update to our values.

    ·
    Alex Bovee
    With great thought and consideration, we have debated, collaborated, and eventually refined our company values and are excited to share our updated version!
  • images/copy-of-c1-resource-graphics-22.png

    Embracing the SaaS Mindset: "There's an App for That"

    ·
    Paul Querna
    "There's an app for that" has become the new norm to navigate the growing software ecosystem. Automation is key to finding this balance.
  • images/decentralize2.png

    Rethinking Access Management: Centralization vs. Decentralization

    ·
    Paul Querna
    Rethinking access management and finding a balance between centralization and decentralization is vital to ensure your organization remains responsive to these changes.
  • images/copy-of-c1-resource-graphics-21.png

    Inside Scoop with Ramp's Head of Security Assurance

    ·
    Kate Cheney
    Hear the inside scoop on, the Head of Security Assurance at Ramp, Paul Yoo's journey to finding ConductorOne and how the partnership has changed the way Ramp achieves compliance. Learn more about Ramp's journey and hear from Paul himself on how ConductorOne has saved him and his team time and effort on exceeding security goals.
  • images/screenshot-2023-03-30-at-1-01-43-pm.png

    The Great Convergence of IT and Security

    ·
    Paul Querna
    The lines between IT and Security are becoming increasingly indistinct. This convergence is fostering a new era of collaboration, adaptability, and shared responsibility. Hear our CTO Paul Querna's thoughts on this complex topic and his outlook on the future of the current security climate.
  • images/dosilekko_vector_art_style_image_that_visually_represents_the_c_148e620b-acfe-4e57-9e9b-b5530ae3160d.png

    Secrets, Key Rotation, and the Role of Automation

    ·
    Paul Querna
    Github's accidental leak of their SSH RSA server private key sheds light on security best practices. What can we do to prevent other such breaches and increase our security posture. Our CTO Paul Querna gives his take.
  • images/copy-of-c1-resource-graphics-17.png

    Continuing the Journey to Least Privilege: Introducing Access Requests

    ·
    Marissa Endres
    Introducing Access Requests: Self-service access requests for your employees via Slack or a web catalog, automatic approval routing, and just-in-time provisioning.
  • images/copy-of-c1-resource-graphics-11.png

    Reimagining Identity Governance

    ·
    Alex Bovee
    Alex Bovee had the opportunity to speak with Lisa Cook from ISACA to discuss all things identity. Hear the full recording and learn more about their views on modern businesses and bridging the gap between compliance measures and security outcomes.
images/newsletter-3.png

Stay in touch

The best way to keep up with identity security tips, guides, and industry best practices.