Traditional PAM is Dead, Long Live Just in Time Access
·Alex BoveeFor the modern, cloud-forward company, strategies for securing infrastructure and identity are changing at a breakneck pace. MFA and trditional PAM are not sufficient for securing access in the cloud. Dive into the future of PAM through least privilege and JIT access in this blog.HARBleed: When History Doesn't Repeat, But It Does Rhyme
·Paul QuernaThe cybersecurity landscape is marked by breaches that serve as learning pivots. The Okta's recent incident shares a thematic lineage with one of the most notorious security lapses in history: Heartbleed. Delve into the C1 coined concept termer "HARBleed," which highlights its procedural kinship with Heartbleed and emphasizing the lurking danger represented by bearer tokens.The Great Convergence of IT and Security
·Paul QuernaThe lines between IT and Security are becoming increasingly indistinct. This convergence is fostering a new era of collaboration, adaptability, and shared responsibility. Hear our CTO Paul Querna's thoughts on this complex topic and his outlook on the future of the current security climate.How to Roll Out Passkeys and Block Phishing Attacks
·Alex BoveeMoving to phishing and social engineering proof authenticators is a must. One of the most effective ways to implement this is through physical passkeys. In this practical guide, learn more about the key steps to roll out physical passkeys for your company.SOC2 and Least Privilege Access Control
·Alex BoveeLeast privilege access control has become the guiding principle for granting ass for SOC 2 compliance, but it can seem daunting to tackle this challenge with so much gray area. Learn how can you practically implement least privilege access controls.