How to Roll Out Passkeys and Block Phishing Attacks
·Alex BoveeMoving to phishing and social engineering proof authenticators is a must. One of the most effective ways to implement this is through physical passkeys. In this practical guide, learn more about the key steps to roll out physical passkeys for your company.Making Sense of the Users, Accounts, and Access in your SaaS and IaaS Apps with a Unified Directory
·Alex BoveeWe have taken identity a step further with our new feature - unified directories! Learn more about how this new feature provides a single, consolidated source of truth for all humans that interact with your organization.When Attacks Go … Well? Key Takeaways From the Reddit Hack
·Alex BoveePhishing has become increasingly prevalent, as seen in Reddit's account compromise last week, and standing privileges and sensitive access pose significant risks. We need to shift to zero standing privileges to secure our access and infrastructure.SOC2 and Least Privilege Access Control
·Alex BoveeLeast privilege access control has become the guiding principle for granting ass for SOC 2 compliance, but it can seem daunting to tackle this challenge with so much gray area. Learn how can you practically implement least privilege access controls.
Stay in touch
The best way to keep up with identity security tips, guides, and industry best practices.