Shine a light on shadow apps
  • images/Building-blocks.jpg

    Your Problems Aren't Unique: How to Build a Foundation Against Overprivileged Access in Any Environment

    ·
    Ishaan Banta
    Does overprivileged access keep you up at night? Learn foundational steps for reducing privileges and increasing security that work for every environment, no matter how complex or unique your challenges may seem.
  • images/2024_03_Biden-Admin-Maritime-Cybersecurity.jpg

    Securing America’s Ports: The Biden-Harris Initiative on Maritime Cybersecurity

    ·
    Ishaan Banta
    The Biden-Harris administration recently announced an initiative to strengthen maritime cybersecurity. In this post, we’ll explore the key elements of the initiative and their implications for the maritime industry and industries like it.
  • images/2024_12_NYDFS-Regulation_-Blog.jpg

    NYDFS Regulation: What It Means for Access Controls and How to Comply

    ·
    Brittany Smail
    The NYDFS recently updated its cybersecurity regulations, requiring companies to implement stricter access controls than ever before to protect sensitive data. Learn more about the new rules and how to comply.
  • images/whitepaper-blog-social-3.png

    Why Modern Organizations Need Next Generation IGA Webinar

    ·
    Kate Cheney
    How can you get visibility into all identities, let alone manage the access each user has? Simon Moffat, founder and research analyst at The CyberHut, and Alex Bovee, ConductorOne’s CEO, discuss these challenges facing the modern enterprise and more on this webinar hosted by The CyberHut.
  • images/copy-of-c1-resource-graphics-21.png

    Inside Scoop with Ramp's Head of Security Assurance

    ·
    Kate Cheney
    Hear the inside scoop on, the Head of Security Assurance at Ramp, Paul Yoo's journey to finding ConductorOne and how the partnership has changed the way Ramp achieves compliance. Learn more about Ramp's journey and hear from Paul himself on how ConductorOne has saved him and his team time and effort on exceeding security goals.
  • images/copy-of-c1-resource-graphics-11.png

    Reimagining Identity Governance

    ·
    Alex Bovee
    Alex Bovee had the opportunity to speak with Lisa Cook from ISACA to discuss all things identity. Hear the full recording and learn more about their views on modern businesses and bridging the gap between compliance measures and security outcomes.
  • images/shift-left-on-identity-travis-mcpeak-01.jpg

    Travis McPeak, CEO and Co-Founder of Resourcely, on Shifting DevSecOps Left and Making Developers More Productive

    ·
    Kate Cheney
    The first in our video interview series, Alex Bovee had the opportunity to talk with Travis McPeak about emerging trends in security, compliance, and platform engineering.
  • images/copy-of-c1-resource-graphics-13.png

    When Attacks Go … Well? Key Takeaways From the Reddit Hack

    ·
    Alex Bovee
    Phishing has become increasingly prevalent, as seen in Reddit's account compromise last week, and standing privileges and sensitive access pose significant risks. We need to shift to zero standing privileges to secure our access and infrastructure.
  • images/c1-blog-03-tips-2400x1350-v2.png

    Best Practices for More Secure AWS IAM

    ·
    Marissa Endres
    AWS IAM can be unwieldy–setting up permissions is complicated and can leave gaps in security when unnecessary access is granted. Learn how to make AWS IAM more secure with best practices for least privilege access controls.
1 2 Next