When Attacks Go … Well? Key Takeaways From the Reddit Hack
·Alex BoveePhishing has become increasingly prevalent, as seen in Reddit's account compromise last week, and standing privileges and sensitive access pose significant risks. We need to shift to zero standing privileges to secure our access and infrastructure.Read MoreSOC2 and Least Privilege Access Control
·Alex BoveeLeast privilege access control has become the guiding principle for granting ass for SOC 2 compliance, but it can seem daunting to tackle this challenge with so much gray area. Learn how can you practically implement least privilege access controls.Read MoreWhen Threat Models Collide
·Paul QuernaInsider and outsider threats are starting to look the same - hackers are stealing identities or logged in sessions. Our approach to a solution? A pragmatic least privilege maturity curve.Read MoreChatGPT and How AI will Impact Security
·Alex BoveeThoughts on ChatGPT, AI, and the long ranging security impacts - especially to phishing and social engineering based attacks.Read MoreBaton and the Journey to Identity Security and Unified Access Control
·Alex BoveeTo realize our vision of securing workforce identity, we needed to be able to connect to any technology, anywhere – and this required a new approach. Baton is our answer.Read MoreTechnical Deep Dive: Using Baton to Audit Infrastructure Access
·John DegnerGetting started with Baton: how to extract, normalize, and interact with identity data using open source Baton connectors.Read MoreAnnouncing Baton, an Open Source Toolkit for Auditing Infrastructure User Access
·Paul QuernaAnnouncing Baton, the first open source toolkit to extract, normalize, and interact with identity data from any app, with a standardized but extensible data model.Read MoreAchieve Least Privilege Access with ConductorOne + Okta
·Samira KahangiLearn how organizations using Okta can supercharge their IAM security strategy and achieve least privilege access with ConductorOneRead MoreHow to Be SOC2 Compliant: A Checklist for Security Teams
·Shanelle RuckerYour first SOC2 audit can seem daunting. Use this checklist to build a strong security strategy that will put you on the right path to compliance.Read More