Shine a light on shadow apps
  • images/baton-launch-11.jpg

    Announcing Baton, an Open Source Toolkit for Auditing Infrastructure User Access

    ·
    Paul Querna
    Announcing Baton, the first open source toolkit to extract, normalize, and interact with identity data from any app, with a standardized but extensible data model.
  • images/c1-perspectives.png

    Achieve Least Privilege Access with ConductorOne + Okta

    ·
    Samira Kahangi
    Learn how organizations using Okta can supercharge their IAM security strategy and achieve least privilege access with ConductorOne
  • images/c1-perspectives.png

    How to Be SOC2 Compliant: A Checklist for Security Teams

    ·
    Shanelle Rucker
    Your first SOC2 audit can seem daunting. Use this checklist to build a strong security strategy that will put you on the right path to compliance.
  • images/c1-perspectives.png

    Birthright Access is Broken

    ·
    Alex Bovee
    Birthright access is an anti-pattern for secure, least privilege access control.
  • images/social-platfroms-access-reviews-features-01-1.png

    Running Your UAR Campaigns: Product Deep Dive

    ·
    Marissa Endres
    Following our last post on scoping UARs with ConductorOne, today we're diving into running the campaign, the reviewer experience, and reporting out to auditors.
  • images/twingate-x-conductorone-final-04.png

    Architecting Zero Trust: Twingate + ConductorOne

    ·
    Marissa Endres
    Twingate and ConductorOne partnered to provide customers with a Zero Trust solution that gives you just-in-time, time-based remote access to your private resources and networks.
  • images/scoping-uar-blog-header.png

    Scoping Your UAR Campaigns: Product Deep Dive

    ·
    Marissa Endres
    We're breaking down and exposing all of our product functionality so you can see how easy it is to scope and set up a UAR campaign with ConductorOne.
  • images/scoping-uar-blog-header.png

    Scoping Your UAR Campaigns: Product Deep Dive

    ·
    Marissa Endres
    We're breaking down and exposing all of our product functionality so you can see how easy it is to scope and set up a UAR campaign with ConductorOne.
  • images/c1-blog-03-tips-2400x1350-v2.png

    Best Practices for More Secure AWS IAM

    ·
    Marissa Endres
    AWS IAM can be unwieldy–setting up permissions is complicated and can leave gaps in security when unnecessary access is granted. Learn how to make AWS IAM more secure with best practices for least privilege access controls.
images/newsletter-3.png

Stay in touch

The best way to keep up with identity security tips, guides, and industry best practices.