Explore the C1 Academy
  • /images/2024_Light-IGA.jpg

    Light IGA — Is It Right for You?

    ·
    Brittany Smail
    The term “light IGA” loosely categorizes a crop of new solutions that don’t line up neatly with the traditional definition of IGA. This post covers what the term means, the wide range of light IGA tools on offer, and what companies should think about when considering light IGA options.
  • /images/end-user-experience.jpg

    The Importance of the End User Experience

    ·
    Ishaan Banta and Brittany Smail
    Companies that prioritize creating great end user experiences as part of their overall identity security program are seeing both productivity and security gains. Learn about their approach and how to build it into your own strategy.
  • /images/2024_Nist-Blog-Post.jpg

    NIST CSF 2.0: What to Know

    ·
    Ishaan Banta
    In February, the National Institute of Standards and Technology (NIST) released a major update to its cybersecurity framework (CSF), which businesses and government organizations use as guidance for mitigating cyber risks. Read on to learn what's new with NIST CSF 2.0 and how to implement its guidelines.
  • /images/What-is-SSO-tax_horizontal.jpg

    The SSO Tax: What It Is and Why It Sucks

    ·
    Ishaan Banta
    In recent years, software vendors have used the importance of SSO to their advantage, building SSO-implementation fees into their pricing—a practice that’s come to be known as the “SSO Tax," a cause of major frustration for companies of all sizes and budgets.
  • /images/Building-blocks.jpg

    Your Problems Aren't Unique: How to Build a Foundation Against Overprivileged Access in Any Environment

    ·
    Ishaan Banta
    Does overprivileged access keep you up at night? Learn foundational steps for reducing privileges and increasing security that work for every environment, no matter how complex or unique your challenges may seem.
  • /images/2024_03_Biden-Admin-Maritime-Cybersecurity.jpg

    Securing America’s Ports: The Biden-Harris Initiative on Maritime Cybersecurity

    ·
    Ishaan Banta
    The Biden-Harris administration recently announced an initiative to strengthen maritime cybersecurity. In this post, we’ll explore the key elements of the initiative and their implications for the maritime industry and industries like it.
  • /images/2024_12_NYDFS-Regulation_-Blog.jpg

    NYDFS Regulation: What It Means for Access Controls and How to Comply

    ·
    Brittany Smail
    The NYDFS recently updated its cybersecurity regulations, requiring companies to implement stricter access controls than ever before to protect sensitive data. Learn more about the new rules and how to comply.
  • /images/whitepaper-blog-social-3.png

    Why Modern Organizations Need Next Generation IGA Webinar

    ·
    Kate Cheney
    How can you get visibility into all identities, let alone manage the access each user has? Simon Moffat, founder and research analyst at The CyberHut, and Alex Bovee, ConductorOne’s CEO, discuss these challenges facing the modern enterprise and more on this webinar hosted by The CyberHut.
  • /images/copy-of-c1-resource-graphics-21.png

    Inside Scoop with Ramp's Head of Security Assurance

    ·
    Kate Cheney
    Hear the inside scoop on, the Head of Security Assurance at Ramp, Paul Yoo's journey to finding ConductorOne and how the partnership has changed the way Ramp achieves compliance. Learn more about Ramp's journey and hear from Paul himself on how ConductorOne has saved him and his team time and effort on exceeding security goals.