Shine a light on shadow apps
  • images/when-threat-models-collide.png

    When Threat Models Collide

    ·
    Paul Querna
    Insider and outsider threats are starting to look the same - hackers are stealing identities or logged in sessions. Our approach to a solution? A pragmatic least privilege maturity curve.
  • images/c1-perspectives.png

    ChatGPT and How AI will Impact Security

    ·
    Alex Bovee
    Thoughts on ChatGPT, AI, and the long ranging security impacts - especially to phishing and social engineering based attacks.
  • images/c1-perspectives.png

    Achieve Least Privilege Access with ConductorOne + Okta

    ·
    Samira Kahangi
    Learn how organizations using Okta can supercharge their IAM security strategy and achieve least privilege access with ConductorOne
  • images/c1-perspectives.png

    How to Be SOC2 Compliant: A Checklist for Security Teams

    ·
    Shanelle Rucker
    Your first SOC2 audit can seem daunting. Use this checklist to build a strong security strategy that will put you on the right path to compliance.
  • images/c1-perspectives.png

    Birthright Access is Broken

    ·
    Alex Bovee
    Birthright access is an anti-pattern for secure, least privilege access control.
  • images/c1-perspectives.png

    Automating Compliance Controls to Achieve Least Privilege Access

    ·
    Alex Bovee
    Modern security teams are automating traditional compliance controls to reduce the risk posture for an organization – what we're calling security-led governance.
  • images/c1-perspectives.png

    Least Privilege Access: What You Need to Know

    ·
    Alex Bovee
    As one of the core tenants of zero trust, least privilege access is probably the least understood and the hardest to reach today. At the highest level, think of least privilege access as providing people – or identities more generally – the access they need to do a job, and for no longer than they need it.
  • images/c1-perspectives.png

    Access Control: Taming Group Sprawl

    ·
    Alex Bovee
    IT, Security, and GRC teams have long held a love-hate relationship with directory groups. Groups enabled companies to scale permissions for a time, but the proliferation of directory groups is now causing major headaches for security.
Previous 1 2