Get the Guide to Modern IGA
  • images/copy-of-c1-resource-graphics-14.png

    How to Roll Out Passkeys and Block Phishing Attacks

    ·
    Alex Bovee
    Moving to phishing and social engineering proof authenticators is a must. One of the most effective ways to implement this is through physical passkeys. In this practical guide, learn more about the key steps to roll out physical passkeys for your company.
  • images/copy-of-c1-resource-graphics-15.png

    Making Sense of the Users, Accounts, and Access in your SaaS and IaaS Apps with a Unified Directory

    ·
    Alex Bovee
    We have taken identity a step further with our new feature - unified directories! Learn more about how this new feature provides a single, consolidated source of truth for all humans that interact with your organization.
  • images/shift-left-on-identity-travis-mcpeak-01.jpg

    Travis McPeak, CEO and Co-Founder of Resourcely, on Shifting DevSecOps Left and Making Developers More Productive

    ·
    Kate Cheney
    The first in our video interview series, Alex Bovee had the opportunity to talk with Travis McPeak about emerging trends in security, compliance, and platform engineering.
  • images/copy-of-c1-resource-graphics-13.png

    When Attacks Go … Well? Key Takeaways From the Reddit Hack

    ·
    Alex Bovee
    Phishing has become increasingly prevalent, as seen in Reddit's account compromise last week, and standing privileges and sensitive access pose significant risks. We need to shift to zero standing privileges to secure our access and infrastructure.
  • images/c1-perspectives.png

    SOC2 and Least Privilege Access Control

    ·
    Alex Bovee
    Least privilege access control has become the guiding principle for granting ass for SOC 2 compliance, but it can seem daunting to tackle this challenge with so much gray area. Learn how can you practically implement least privilege access controls.
  • images/when-threat-models-collide.png

    When Threat Models Collide

    ·
    Paul Querna
    Insider and outsider threats are starting to look the same - hackers are stealing identities or logged in sessions. Our approach to a solution? A pragmatic least privilege maturity curve.
  • images/c1-perspectives.png

    ChatGPT and How AI will Impact Security

    ·
    Alex Bovee
    Thoughts on ChatGPT, AI, and the long ranging security impacts - especially to phishing and social engineering based attacks.
  • images/baton-launch-03.jpg

    Baton and the Journey to Identity Security and Unified Access Control

    ·
    Alex Bovee
    To realize our vision of securing workforce identity, we needed to be able to connect to any technology, anywhere – and this required a new approach. Baton is our answer.
  • images/copy-of-baton-launch-01-1.jpg

    Technical Deep Dive: Using Baton to Audit Infrastructure Access

    ·
    John Degner
    Getting started with Baton: how to extract, normalize, and interact with identity data using open source Baton connectors.
images/newsletter-3.png

Stay in touch

The best way to keep up with identity security tips, guides, and industry best practices.