




Beyond Checking the Box: How to Use UARs for Real Security
·Marcus WhitakerMost companies treat user access reviews (UARs) as a compliance checkbox, but that’s a missed opportunity. This blog explores how leading security teams use UARs to reduce risk, eliminate unused access, and enforce policies more effectively, with real-world examples you can implement today.

Managing Identity for SQL-Powered Apps: No APIs Necessary
·Justin GallardoDiscover how Baton-SQL helps organizations integrate legacy and homegrown applications into their identity governance programs, no APIs or custom code required. Learn how our open-source connector enables fast, scalable access to identity and access data directly from any SQL database.

How ConductorOne Built Guardrails Into Our AI Agents
·Paul QuernaGo behind the scenes of how we built guardrails into Thomas, ConductorOne’s AI agent—and the industry’s first multi-agent identity security platform. This blog breaks down our architecture, trust models, and sandboxing techniques that ensure agents can automate identity governance safely, securely, and transparently.

Stay in touch
The best way to keep up with identity security tips, guides, and industry best practices.