Shine a light on shadow apps
  • images/2024-12-zero-trust-in-practice-frame.jpg

    Zero Trust in Practice: How We Keep Customer Data Secure at ConductorOne

    ·
    Brittany Smail
    Our company mission to “secure the workforce” guides not only how we design our platform but also our multilayered internal approach to protecting customer data.
  • images/blog-header-1.png

    Traditional PAM is Dead, Long Live Just in Time Access

    ·
    Alex Bovee
    For the modern, cloud-forward company, strategies for securing infrastructure and identity are changing at a breakneck pace. MFA and trditional PAM are not sufficient for securing access in the cloud. Dive into the future of PAM through least privilege and JIT access in this blog.
  • images/blog-harbleed-header.png

    HARBleed: When History Doesn't Repeat, But It Does Rhyme

    ·
    Paul Querna
    The cybersecurity landscape is marked by breaches that serve as learning pivots. The Okta's recent incident shares a thematic lineage with one of the most notorious security lapses in history: Heartbleed. Delve into the C1 coined concept termer "HARBleed," which highlights its procedural kinship with Heartbleed and emphasizing the lurking danger represented by bearer tokens.
  • images/copy-of-c1-resource-graphics-22.png

    Embracing the SaaS Mindset: "There's an App for That"

    ·
    Paul Querna
    "There's an app for that" has become the new norm to navigate the growing software ecosystem. Automation is key to finding this balance.
  • images/decentralize2.png

    Rethinking Access Management: Centralization vs. Decentralization

    ·
    Paul Querna
    Rethinking access management and finding a balance between centralization and decentralization is vital to ensure your organization remains responsive to these changes.
  • images/screenshot-2023-03-30-at-1-01-43-pm.png

    The Great Convergence of IT and Security

    ·
    Paul Querna
    The lines between IT and Security are becoming increasingly indistinct. This convergence is fostering a new era of collaboration, adaptability, and shared responsibility. Hear our CTO Paul Querna's thoughts on this complex topic and his outlook on the future of the current security climate.
  • images/dosilekko_vector_art_style_image_that_visually_represents_the_c_148e620b-acfe-4e57-9e9b-b5530ae3160d.png

    Secrets, Key Rotation, and the Role of Automation

    ·
    Paul Querna
    Github's accidental leak of their SSH RSA server private key sheds light on security best practices. What can we do to prevent other such breaches and increase our security posture. Our CTO Paul Querna gives his take.
  • images/copy-of-c1-resource-graphics-14.png

    How to Roll Out Passkeys and Block Phishing Attacks

    ·
    Alex Bovee
    Moving to phishing and social engineering proof authenticators is a must. One of the most effective ways to implement this is through physical passkeys. In this practical guide, learn more about the key steps to roll out physical passkeys for your company.
  • images/c1-perspectives.png

    SOC2 and Least Privilege Access Control

    ·
    Alex Bovee
    Least privilege access control has become the guiding principle for granting ass for SOC 2 compliance, but it can seem daunting to tackle this challenge with so much gray area. Learn how can you practically implement least privilege access controls.
1 2 Next