Shine a light on shadow apps
  • images/shift-left-on-identity-travis-mcpeak-01.jpg

    Travis McPeak, CEO and Co-Founder of Resourcely, on Shifting DevSecOps Left and Making Developers More Productive

    ·
    Kate Cheney
    The first in our video interview series, Alex Bovee had the opportunity to talk with Travis McPeak about emerging trends in security, compliance, and platform engineering.
  • images/copy-of-c1-resource-graphics-13.png

    When Attacks Go … Well? Key Takeaways From the Reddit Hack

    ·
    Alex Bovee
    Phishing has become increasingly prevalent, as seen in Reddit's account compromise last week, and standing privileges and sensitive access pose significant risks. We need to shift to zero standing privileges to secure our access and infrastructure.
  • images/c1-perspectives.png

    SOC2 and Least Privilege Access Control

    ·
    Alex Bovee
    Least privilege access control has become the guiding principle for granting ass for SOC 2 compliance, but it can seem daunting to tackle this challenge with so much gray area. Learn how can you practically implement least privilege access controls.
  • images/when-threat-models-collide.png

    When Threat Models Collide

    ·
    Paul Querna
    Insider and outsider threats are starting to look the same - hackers are stealing identities or logged in sessions. Our approach to a solution? A pragmatic least privilege maturity curve.
  • images/c1-perspectives.png

    ChatGPT and How AI will Impact Security

    ·
    Alex Bovee
    Thoughts on ChatGPT, AI, and the long ranging security impacts - especially to phishing and social engineering based attacks.
  • images/baton-launch-03.jpg

    Baton and the Journey to Identity Security and Unified Access Control

    ·
    Alex Bovee
    To realize our vision of securing workforce identity, we needed to be able to connect to any technology, anywhere – and this required a new approach. Baton is our answer.
  • images/copy-of-baton-launch-01-1.jpg

    Technical Deep Dive: Using Baton to Audit Infrastructure Access

    ·
    John Degner
    Getting started with Baton: how to extract, normalize, and interact with identity data using open source Baton connectors.
  • images/baton-launch-11.jpg

    Announcing Baton, an Open Source Toolkit for Auditing Infrastructure User Access

    ·
    Paul Querna
    Announcing Baton, the first open source toolkit to extract, normalize, and interact with identity data from any app, with a standardized but extensible data model.
  • images/c1-perspectives.png

    Achieve Least Privilege Access with ConductorOne + Okta

    ·
    Samira Kahangi
    Learn how organizations using Okta can supercharge their IAM security strategy and achieve least privilege access with ConductorOne

Stay up on the latest from ConductorOne