<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Blog</title>
    <link>https://www.c1.ai/blog/</link>
    <description>Recent content in Blog on ConductorOne</description>
    <language>en-us</language>
    <lastBuildDate>Mon, 06 Apr 2026 07:00:00 GMT</lastBuildDate>
    <atom:link href="https://www.c1.ai/blog/feed.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>We Are C1</title>
      <link>https://www.c1.ai/blog/wearec1/</link>
      <pubDate>Mon, 06 Apr 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/wearec1/</guid>
      <description>Today, ConductorOne becomes C1. A new name for a new era of identity — one where AI agents outnumber humans and the identity platform must govern both.</description>
    </item>
    <item>
      <title>Squire: Agentic-First Ephemeral Dev Environments at C1</title>
      <link>https://www.c1.ai/blog/squire-agentic-first-ephemeral-dev-environments-at-conductorone/</link>
      <pubDate>Fri, 03 Apr 2026 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/squire-agentic-first-ephemeral-dev-environments-at-conductorone/</guid>
      <description>How C1 built Squire, an agent-first ephemeral development environment where AI agents operate on real, running instances of the product. Learn about the workflow engine, CLI, Slack integration, and how we&apos;re operationalizing the agentic enterprise internally.</description>
    </item>
    <item>
      <title>A CISO&apos;s Top 3 Takeaways from RSA Conference 2026</title>
      <link>https://www.c1.ai/blog/ciso-top-3-takeaways-rsa-conference-2026/</link>
      <pubDate>Wed, 01 Apr 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/ciso-top-3-takeaways-rsa-conference-2026/</guid>
      <description>C1 Field CISO Kevin Paige breaks down the three defining security shifts from RSA Conference 2026: the agent governance crisis, 22-second attack windows that broke human-in-the-loop defense, and the rise of MCP as the protocol controlling every AI agent in your enterprise.</description>
    </item>
    <item>
      <title>Your Recruiting Stack Is a Disaster. We&apos;re Burning Ours Down.</title>
      <link>https://www.c1.ai/blog/your-recruiting-stack-is-a-disaster/</link>
      <pubDate>Fri, 27 Mar 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/your-recruiting-stack-is-a-disaster/</guid>
      <description>Most recruiting stacks are six tools, six contracts, and eight UIs duct-taped together. C1&apos;s Head of Talent explains why we stopped buying tools and started building AI agents that give recruiters their real job back.</description>
    </item>
    <item>
      <title>The Fastest Path to AI Is Now the Safest Path: Introducing AI Access Management by C1</title>
      <link>https://www.c1.ai/blog/introducing-ai-access-management/</link>
      <pubDate>Thu, 19 Mar 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/introducing-ai-access-management/</guid>
      <description>Today, we&apos;re announcing AI Access Management: a unified control plane for managing access to AI tools and data used by employees, in personal assistants, and enterprise agents. </description>
    </item>
    <item>
      <title>Extensible Identity Flows: How C1 Finally Made Joiner Provisioning Bend to Your Rules</title>
      <link>https://www.c1.ai/blog/extensible-identity-flows-joiner-provisioning/</link>
      <pubDate>Wed, 18 Mar 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/extensible-identity-flows-joiner-provisioning/</guid>
      <description>Joiner flows accumulate business logic that outgrows whatever system tries to express it. Here&apos;s how C1&apos;s extensible identity flows and Functions let you describe exactly what your organization needs — without external scripts or an engineering team.</description>
    </item>
    <item>
      <title>Introducing Secret Sharing in C1</title>
      <link>https://www.c1.ai/blog/introducing-secret-sharing/</link>
      <pubDate>Tue, 17 Mar 2026 00:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/introducing-secret-sharing/</guid>
      <description>Securely share credentials without Slack, vault sprawl, or risk. C1’s Secret Sharing encrypts secrets client-side, enforces access controls, and auto-expires links—simple, auditable, and built into identity governance.</description>
    </item>
    <item>
      <title>Three Properties Identity Must Have in the Agentic Era</title>
      <link>https://www.c1.ai/blog/three-properties-identity-must-have-in-the-agentic-era/</link>
      <pubDate>Thu, 12 Mar 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/three-properties-identity-must-have-in-the-agentic-era/</guid>
      <description>Identity governance was failing before AI agents arrived. With multiple agents per employee spawning their own, here&apos;s what infrastructure must look like to survive.</description>
    </item>
    <item>
      <title>Your AI Strategy Has a Blind Spot</title>
      <link>https://www.c1.ai/blog/your-ai-strategy-has-a-blind-spot/</link>
      <pubDate>Sun, 08 Mar 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/your-ai-strategy-has-a-blind-spot/</guid>
      <description>AI governance isn&apos;t a new silo. It&apos;s an identity problem. See how identity-first governance makes every team AI-native without sacrificing control.</description>
    </item>
    <item>
      <title>Access Management Needs a Conductor, Not More Instruments</title>
      <link>https://www.c1.ai/blog/access-management-needs-a-conductor/</link>
      <pubDate>Wed, 04 Mar 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/access-management-needs-a-conductor/</guid>
      <description>Kevin Paige argues that enterprise identity&apos;s real problem isn&apos;t the tools -- it&apos;s the lack of orchestration. With AI agents multiplying and identity sprawl accelerating, access management needs a conductor, not more instruments.</description>
    </item>
    <item>
      <title>Introducing Functions: Extend Identity Governance With Custom Code, Built Directly Into C1</title>
      <link>https://www.c1.ai/blog/introducing-functions/</link>
      <pubDate>Wed, 25 Feb 2026 09:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/introducing-functions/</guid>
      <description>Extend identity governance with C1 Functions. Write and run custom TypeScript code securely to automate workflows, provisioning, and policy logic.</description>
    </item>
    <item>
      <title>How RRCU Uses C1 Automations to Streamline Identity Operations</title>
      <link>https://www.c1.ai/blog/how-rrcu-uses-conductorone-automations/</link>
      <pubDate>Mon, 23 Feb 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/how-rrcu-uses-conductorone-automations/</guid>
      <description>Automate identity governance with C1 Automations. See how Red River Credit Union streamlined onboarding, offboarding, access reviews, and platform migrations using no-code workflows, AI optimization, and real-time identity data to reduce manual effort and improve security.</description>
    </item>
    <item>
      <title>Your Enterprise Needs an Immune System, Not a Better Firewall</title>
      <link>https://www.c1.ai/blog/your-enterprise-needs-an-immune-system/</link>
      <pubDate>Wed, 18 Feb 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/your-enterprise-needs-an-immune-system/</guid>
      <description>Kevin Paige explores why identity and access management must evolve into a distributed “enterprise immune system” to govern AI agents, non-human identities, and continuous risk.</description>
    </item>
    <item>
      <title>Why IAM, IGA, and PAM Break in the Agentic Enterprise</title>
      <link>https://www.c1.ai/blog/why-iam-iga-and-pam-break-in-the-agentic-enterprise/</link>
      <pubDate>Tue, 17 Feb 2026 01:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/why-iam-iga-and-pam-break-in-the-agentic-enterprise/</guid>
      <description>Identity built for humans can’t govern autonomous AI. Learn why IAM, IGA, and PAM break in the agentic enterprise and what a modern identity control plane must look like.</description>
    </item>
    <item>
      <title>Defining the Agentic Enterprise</title>
      <link>https://www.c1.ai/blog/defining-the-agentic-enterprise/</link>
      <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/defining-the-agentic-enterprise/</guid>
      <description>The agentic enterprise is reshaping how work gets done. C1 CEO Alex Bovee explains why humans are becoming managers of AI agents, why identity becomes the control plane, and what organizations must rethink to scale automation without losing security or governance.</description>
    </item>
    <item>
      <title>What Identity Governance Looks Like When Automation Does the Work</title>
      <link>https://www.c1.ai/blog/what-identity-governance-looks-like-when-automation-does-the-work/</link>
      <pubDate>Tue, 10 Feb 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/what-identity-governance-looks-like-when-automation-does-the-work/</guid>
      <description>What does identity governance look like when automation does the work? New data from C1 customers shows how organizations govern access at scale with policy and automation.</description>
    </item>
    <item>
      <title>The Modern IGA RFP Guide: How to Choose the Right Identity Governance Platform in 2026</title>
      <link>https://www.c1.ai/blog/the-modern-iga-rfp-guide/</link>
      <pubDate>Mon, 09 Feb 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/the-modern-iga-rfp-guide/</guid>
      <description>Finding the right IGA solution in 2026 can be a challenge. Learn how to build an effective RFP, evaluate vendors, and choose a platform that simplifies identity security, scales with your business, and accelerates time to value.</description>
    </item>
    <item>
      <title>Meet Automations Architect: Build Automated Workflows in Minutes</title>
      <link>https://www.c1.ai/blog/meet-automations-architect/</link>
      <pubDate>Fri, 06 Feb 2026 09:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/meet-automations-architect/</guid>
      <description>Meet Automations Architect, C1’s AI assistant for identity automation. Build, edit, and deploy secure workflows using natural language.</description>
    </item>
    <item>
      <title>The IGA Maturity Curve: Shifting from Reviews to Assurance</title>
      <link>https://www.c1.ai/blog/iga-maturity-curve-treasure-data-webinar-recap/</link>
      <pubDate>Fri, 06 Feb 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/iga-maturity-curve-treasure-data-webinar-recap/</guid>
      <description>A GRC leader’s take on why manual UARs are breaking down and what continuous identity assurance looks like in practice.</description>
    </item>
    <item>
      <title>January 2026 Product Updates: Modern Identity at Scale</title>
      <link>https://www.c1.ai/blog/january-2026/</link>
      <pubDate>Fri, 30 Jan 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/january-2026/</guid>
      <description>See C1’s January 2026 updates, focused on continuous identity governance, self-service automation, faster access reviews, and deeper visibility.</description>
    </item>
    <item>
      <title>Take Full Control of Identity Data with Advanced Attribute Mapping in Super Directory</title>
      <link>https://www.c1.ai/blog/advanced-attribute-matchings-with-super-directory/</link>
      <pubDate>Tue, 27 Jan 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/advanced-attribute-matchings-with-super-directory/</guid>
      <description>Learn how Super Directory uses fallback mappings and CEL expressions to precisely map user attributes and match identities across apps in C1.</description>
    </item>
    <item>
      <title>Why User Access Reviews Are Becoming a Relic of the Past</title>
      <link>https://www.c1.ai/blog/why-uars-are-becoming-a-relic-of-the-past/</link>
      <pubDate>Tue, 20 Jan 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/why-uars-are-becoming-a-relic-of-the-past/</guid>
      <description>UARs aren’t enough for modern identity risk. Discover how continuous, policy-driven controls replace review-centric governance without breaking audits.</description>
    </item>
    <item>
      <title>10 IGA Metrics Every Security Team Should Use to Measure Success</title>
      <link>https://www.c1.ai/blog/10-iga-metrics-every-security-team-should-use/</link>
      <pubDate>Fri, 16 Jan 2026 00:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/10-iga-metrics-every-security-team-should-use/</guid>
      <description>Still measuring IGA by checklists? Learn the identity governance metrics that show real risk reduction and efficiency in 2026.</description>
    </item>
    <item>
      <title>NIST’s New Cyber AI Profile Signals a Shift: AI Security Starts With Identity</title>
      <link>https://www.c1.ai/blog/nist-releases-cyber-ai-profile/</link>
      <pubDate>Tue, 13 Jan 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/nist-releases-cyber-ai-profile/</guid>
      <description>NIST released a new Cyber AI Profile outlining how to secure AI at scale. See why identity is central to AI security and what teams must do next.</description>
    </item>
    <item>
      <title>Identity Becomes the Battlefield: 3 Cybersecurity Predictions for 2026</title>
      <link>https://www.c1.ai/blog/identity-becomes-the-battlefield-in-2026/</link>
      <pubDate>Thu, 08 Jan 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/identity-becomes-the-battlefield-in-2026/</guid>
      <description>Identity becomes the top cybersecurity risk in 2026. Explore three predictions on identity security, agentic AI, and IAM consolidation.</description>
    </item>
    <item>
      <title>How Dynamic Access Enables Least Privilege</title>
      <link>https://www.c1.ai/blog/how-dynamic-access-enables-least-privilege/</link>
      <pubDate>Fri, 02 Jan 2026 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/how-dynamic-access-enables-least-privilege/</guid>
      <description>See how C1 enables dynamic access control using real-time context to grant and revoke access as work changes.</description>
    </item>
    <item>
      <title>December Product Wrap-Up</title>
      <link>https://www.c1.ai/blog/december-2025/</link>
      <pubDate>Tue, 30 Dec 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/december-2025/</guid>
      <description>December product updates focused on better UX, faster access reviews, stronger insights, and expanded connectors to help identity governance scale.</description>
    </item>
    <item>
      <title>Access Profiles: A Smarter Way to Manage and Provision Access</title>
      <link>https://www.c1.ai/blog/access-profiles-a-smarter-way/</link>
      <pubDate>Mon, 22 Dec 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/access-profiles-a-smarter-way/</guid>
      <description>Learn what access profiles are in C1, how they group entitlements, enable automation, and simplify access requests, reviews, and onboarding at scale.</description>
    </item>
    <item>
      <title>Incremental Sync: How C1 Keeps Identity Data Fresh in Real Time</title>
      <link>https://www.c1.ai/blog/incremental-sync/</link>
      <pubDate>Thu, 18 Dec 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/incremental-sync/</guid>
      <description>Learn how C1’s incremental sync keeps identity and access data fresh using event-based updates for real-time identity governance.</description>
    </item>
    <item>
      <title>Risks of Weak Identity Governance in 2026</title>
      <link>https://www.c1.ai/blog/risks-of-weak-iga-2026/</link>
      <pubDate>Fri, 12 Dec 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/risks-of-weak-iga-2026/</guid>
      <description>Identity is the fastest-growing attack surface in 2026. See how weak identity governance, manual UARs, and AI agents increase risk.</description>
    </item>
    <item>
      <title>Human vs. Non-Human Identities Explained</title>
      <link>https://www.c1.ai/blog/human-vs-nhi-explained/</link>
      <pubDate>Tue, 09 Dec 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/human-vs-nhi-explained/</guid>
      <description>Discover how non-human identities like service accounts and AI agents work, why they create new security risks, and how to govern them effectively.</description>
    </item>
    <item>
      <title>Identity Maturity in 2026: How the Best Teams Move Forward</title>
      <link>https://www.c1.ai/blog/identity-maturity-in-2026/</link>
      <pubDate>Thu, 04 Dec 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/identity-maturity-in-2026/</guid>
      <description>Learn how leading teams build visibility, governance, and automation to reduce risk and scale securely.</description>
    </item>
    <item>
      <title>To Provision or Not to Provision: Why JIT Solves The Helpdesk Catch-22</title>
      <link>https://www.c1.ai/blog/to-provision-or-not-to-provision/</link>
      <pubDate>Thu, 04 Dec 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/to-provision-or-not-to-provision/</guid>
      <description>Discover how just-in-time access and agentic automation empower helpdesk teams to work faster and safer. Learn how C1 eliminates standing privileges, reduces bottlenecks, and supports technician growth without compromising security.</description>
    </item>
    <item>
      <title>SoD in Modern Identity Security: How C1 Prevents Access Conflicts Before They Become Risk</title>
      <link>https://www.c1.ai/blog/sod-in-modern-identity-security/</link>
      <pubDate>Tue, 25 Nov 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/sod-in-modern-identity-security/</guid>
      <description>Learn how C1 detects, prevents, and remediates access conflicts to enforce separation of duties and strengthen your identity security program.</description>
    </item>
    <item>
      <title>So Long, Standing Access: Inside Instacart’s Just-In-Time Access Playbook</title>
      <link>https://www.c1.ai/blog/inside-instacarts-just-in-time-access-playbook/</link>
      <pubDate>Tue, 18 Nov 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/inside-instacarts-just-in-time-access-playbook/</guid>
      <description>Learn how Instacart built a fully automated, policy-driven, engineering friendly just-in-time (JIT) access program with C1. </description>
    </item>
    <item>
      <title>Introducing C1’s Advanced Microsoft Teams Integration: Identity Security Where Your Team Works</title>
      <link>https://www.c1.ai/blog/introducing-conductorones-advanced-microsoft-teams-integration/</link>
      <pubDate>Wed, 12 Nov 2025 12:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/introducing-conductorones-advanced-microsoft-teams-integration/</guid>
      <description>C1 now brings secure access workflows directly into Microsoft Teams, helping employees complete reviews and requests without switching tools. Reduce friction, speed up decisions, and improve adoption with identity security that fits naturally into the flow of work.</description>
    </item>
    <item>
      <title>Here&apos;s What Your Auditor Thinks About Agentic AI</title>
      <link>https://www.c1.ai/blog/heres-what-your-auditor-thinks-about-agentic-ai/</link>
      <pubDate>Mon, 10 Nov 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/heres-what-your-auditor-thinks-about-agentic-ai/</guid>
      <description>Learn how agentic AI is changing the audit process, magnifying risk fundamentals, and raising the compliance floor.</description>
    </item>
    <item>
      <title>Meet Super Directory: Identity Orchestration Starts Here</title>
      <link>https://www.c1.ai/blog/meet-super-directory/</link>
      <pubDate>Thu, 06 Nov 2025 12:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/meet-super-directory/</guid>
      <description>Introducing Super Directory, C1’s single source of truth for identity data. Standardize attributes, manage profile types and groups, automate updates across your stack, and strengthen security with clean, consistent, centralized identity management.</description>
    </item>
    <item>
      <title>How Tide Uses C1 to Operationalize Least Privilege at Scale</title>
      <link>https://www.c1.ai/blog/how-tide-uses-conductorone-to-operationalize-least-privilege-at-scale/</link>
      <pubDate>Wed, 05 Nov 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/how-tide-uses-conductorone-to-operationalize-least-privilege-at-scale/</guid>
      <description>Modernizing identity at scale: See how Tide adopted C1 and Terraform to move from static, role-based access to needs-based least privilege, automate birthright and just-in-time access, and streamline approvals for 2,000 users across critical systems.</description>
    </item>
    <item>
      <title>C1, the Identity Security Platform of the AI Era, Raises $79M Series B</title>
      <link>https://www.c1.ai/blog/series-b/</link>
      <pubDate>Tue, 28 Oct 2025 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/series-b/</guid>
      <description>C1 has raised $79M to lead the next era of identity security—replacing legacy identity tools with an AI-native platform that secures every human, machine, and AI identity at enterprise scale. Learn how we unify access, automate governance, and deliver real security outcomes for the modern enterprise.</description>
    </item>
    <item>
      <title>How Weaviate Automated Privileged Access And Turned Zero Trust Into A Customer Win</title>
      <link>https://www.c1.ai/blog/how-weaviate-automated-privileged-access/</link>
      <pubDate>Fri, 24 Oct 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/how-weaviate-automated-privileged-access/</guid>
      <description>C1 helped Weaviate eliminate standing access and cut manual access management from two days to two hours per week with fully automated JIT workflows.</description>
    </item>
    <item>
      <title>Building Trust Through Connector Reliability</title>
      <link>https://www.c1.ai/blog/building-trust-through-connector-reliability/</link>
      <pubDate>Tue, 21 Oct 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/building-trust-through-connector-reliability/</guid>
      <description>Reliable IGA connectors are critical to identity security. Learn how C1 ensures trust and accuracy with anomaly detection, monitoring, and safe controls.</description>
    </item>
    <item>
      <title>The Power of Policies in C1</title>
      <link>https://www.c1.ai/blog/power-of-policies-in-c1/</link>
      <pubDate>Wed, 08 Oct 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/power-of-policies-in-c1/</guid>
      <description>Discover how C1’s flexible, layered policies automate access reviews, approvals, and least privilege at enterprise scale.</description>
    </item>
    <item>
      <title>Custom Connectors: Simplifying Integrations Without Code</title>
      <link>https://www.c1.ai/blog/custom-connectors/</link>
      <pubDate>Thu, 02 Oct 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/custom-connectors/</guid>
      <description>Learn how C1 makes custom connectors fast and flexible with 300+ out-of-the-box integrations, YAML no-code options, and the Baton SDK. Simplify app onboarding, streamline identity governance, and scale your access management program with ease.</description>
    </item>
    <item>
      <title>Virtual Entitlements: Simplifying Access and Bundling Permissions</title>
      <link>https://www.c1.ai/blog/virtual-entitlements-simplifying-access-and-bundling-permissions/</link>
      <pubDate>Tue, 30 Sep 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/virtual-entitlements-simplifying-access-and-bundling-permissions/</guid>
      <description>Discover how C1’s virtual entitlements simplify identity management by translating technical group names into plain language and bundling permissions into intuitive apps. Learn real-world use cases that improve clarity, reduce IT overhead, and streamline access requests.</description>
    </item>
    <item>
      <title>Moving Beyond Least Privilege</title>
      <link>https://www.c1.ai/blog/moving-beyond-least-privilege/</link>
      <pubDate>Fri, 26 Sep 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/moving-beyond-least-privilege/</guid>
      <description>Least privilege has long been security’s holy grail—but in today’s world of app sprawl, AI agents, and constant change, it’s broken. Learn why zero standing access is the future, with just-in-time provisioning, step-up approvals, and full auditability.</description>
    </item>
    <item>
      <title>Managing Identity as Code: How to Use Terraform with C1</title>
      <link>https://www.c1.ai/blog/managing-identity-as-code-how-to-use-terraform-with-c1/</link>
      <pubDate>Tue, 23 Sep 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/managing-identity-as-code-how-to-use-terraform-with-c1/</guid>
      <description>Discover how Terraform and C1 turn identity management into code. Automate policies, rotate secrets, manage access profiles, and gain auditability for secure, efficient, and consistent identity governance.</description>
    </item>
    <item>
      <title>Accelerating Integrations with AI-Generated Connectors</title>
      <link>https://www.c1.ai/blog/accelerating-integrations-with-ai-generated-connectors/</link>
      <pubDate>Thu, 18 Sep 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/accelerating-integrations-with-ai-generated-connectors/</guid>
      <description>Discover how C1 uses AI-generated connectors enable faster integrations, greater scalability, and complete visibility across your environment.</description>
    </item>
    <item>
      <title>Simplifying FedRAMP Compliance with C1</title>
      <link>https://www.c1.ai/blog/simplifying-fedramp-compliance-with-c1/</link>
      <pubDate>Wed, 17 Sep 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/simplifying-fedramp-compliance-with-c1/</guid>
      <description>Learn what FedRAMP is, why it matters for cloud service providers, and how C1 simplifies compliance with automated user access reviews, data accuracy reporting, and modern identity governance to accelerate authorization and reduce risk.</description>
    </item>
    <item>
      <title>From Manual to Intelligent: Using AI to Mature Your IGA Program</title>
      <link>https://www.c1.ai/blog/from-manual-to-intelligent-using-ai-to-mature-y/</link>
      <pubDate>Fri, 12 Sep 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/from-manual-to-intelligent-using-ai-to-mature-y/</guid>
      <description>See how AI can mature your identity governance and administration (IGA) program. C1’s AI agent Thomas automates approvals, access reviews, and policy enforcement, while Copilot, an interactive assistant, streamlines workflows, surfaces risk insights, and guides smarter decisions. Scale governance for human and non-human identities, reduce IT overhead, and enforce least privilege at enterprise scale.</description>
    </item>
    <item>
      <title>How UAR Automation Improves Audit Readiness and Reduces Risk</title>
      <link>https://www.c1.ai/blog/how-uar-automation-improves-audit-readiness-and-reduces-risk/</link>
      <pubDate>Tue, 09 Sep 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/how-uar-automation-improves-audit-readiness-and-reduces-risk/</guid>
      <description>Automate user access reviews to save time, cut risk, and boost audit readiness. See how C1 transforms UARs into continuous control.</description>
    </item>
    <item>
      <title>Security vs. Compliance: Bridging the Gap with C1</title>
      <link>https://www.c1.ai/blog/security-vs-compliance-bridging-the-gap-with-c1/</link>
      <pubDate>Fri, 05 Sep 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/security-vs-compliance-bridging-the-gap-with-c1/</guid>
      <description>Learn why modern identity governance must shift from checkbox compliance to a security-first approach with proactive access reviews, least privilege, and automation that keeps you audit-ready.</description>
    </item>
    <item>
      <title>Spotting the Unknown: How Grant Found Trigger Automation Strengthens Security</title>
      <link>https://www.c1.ai/blog/grant-trigger-found/</link>
      <pubDate>Wed, 03 Sep 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/grant-trigger-found/</guid>
      <description>Discover how C1’s grant found trigger automation helps security teams detect and remediate shadow access in real time. Stop unmanaged grants in AWS, GCP, GitHub, and more with automated workflows that notify, review, or revoke to enforce least privilege and close access blind spots.</description>
    </item>
    <item>
      <title>Meet IVIP: A New Era of Identity Visibility</title>
      <link>https://www.c1.ai/blog/meet-ivip/</link>
      <pubDate>Thu, 28 Aug 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/meet-ivip/</guid>
      <description>Discover Gartner’s new IVIP category and how C1 delivers unified identity visibility and intelligence to secure every identity.</description>
    </item>
    <item>
      <title>How Treasure Data Transformed User Access Reviews with C1</title>
      <link>https://www.c1.ai/blog/how-treasure-data-transformed-user-access-reviews-with-conductorone/</link>
      <pubDate>Tue, 26 Aug 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/how-treasure-data-transformed-user-access-reviews-with-conductorone/</guid>
      <description>Discover how Treasure Data transformed its user access review program from manual spreadsheets to intelligent, continuous reviews with C1—cutting 160+ hours annually, expanding scope, and achieving meaningful security outcomes beyond compliance.</description>
    </item>
    <item>
      <title>Five Ways to Streamline SOX Compliance with C1</title>
      <link>https://www.c1.ai/blog/five-ways-conductorone-streamlines-sox-compliance/</link>
      <pubDate>Wed, 20 Aug 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/five-ways-conductorone-streamlines-sox-compliance/</guid>
      <description>C1 automates access reviews, centralizes reporting, and streamlines SOX compliance for faster, audit-ready results.</description>
    </item>
    <item>
      <title>How SLA Escalation Policies Work in C1</title>
      <link>https://www.c1.ai/blog/how-sla-escalation-policies-work-in-conductorone/</link>
      <pubDate>Thu, 14 Aug 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/how-sla-escalation-policies-work-in-conductorone/</guid>
      <description>Learn how C1’s SLA escalation policies prevent stalled access requests by automatically escalating or rerouting approvals. Keep workflows moving and productivity high.</description>
    </item>
    <item>
      <title>Build vs. Buy for IGA: Why C1 Wins Every Time</title>
      <link>https://www.c1.ai/blog/build-vs-buy-in-iga/</link>
      <pubDate>Thu, 07 Aug 2025 00:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/build-vs-buy-in-iga/</guid>
      <description>Compare the true costs of building vs. buying an identity governance solution and see why C1 delivers faster, more cost‑effective, and future‑ready results.</description>
    </item>
    <item>
      <title>Simplify Onboarding with Automated Account Provisioning</title>
      <link>https://www.c1.ai/blog/simplify-onboarding-with-automated-account-provisioning/</link>
      <pubDate>Tue, 05 Aug 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/simplify-onboarding-with-automated-account-provisioning/</guid>
      <description>Automate and streamline employee onboarding with C1, delivering instant birthright access, seamless account provisioning, and a frictionless first-day experience.</description>
    </item>
    <item>
      <title>Four Ways to Use C1 Automations to Strengthen Security</title>
      <link>https://www.c1.ai/blog/four-ways-to-use-conductorone-automations-to-strengthen-security/</link>
      <pubDate>Thu, 31 Jul 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/four-ways-to-use-conductorone-automations-to-strengthen-security/</guid>
      <description>Automate identity security with speed and precision. Learn how C1 Automations help security teams reduce risk, enforce least privilege, and respond to high-risk access changes in real time without adding operational overhead.</description>
    </item>
    <item>
      <title>U.S. vs. U.K. Perspectives on AI and Security</title>
      <link>https://www.c1.ai/blog/us-vs-uk-perspectives-on-ai-and-security/</link>
      <pubDate>Thu, 24 Jul 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/us-vs-uk-perspectives-on-ai-and-security/</guid>
      <description>A firsthand look at how AI adoption, regulation, and security culture differ between the U.S. and U.K. and what that means for identity governance in a global world.</description>
    </item>
    <item>
      <title>IT’s Silent Assassin: How to Handle Ninja SaaS</title>
      <link>https://www.c1.ai/blog/ninja-saas/</link>
      <pubDate>Tue, 22 Jul 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/ninja-saas/</guid>
      <description>Learn how to spot and manage Ninja SaaS, unauthorized apps that quietly enter your environment, before they turn into costly security and compliance risks.</description>
    </item>
    <item>
      <title>How to Streamline IT Operations with C1 Automations</title>
      <link>https://www.c1.ai/blog/how-to-streamline-it-operations-with-conductorone-automations/</link>
      <pubDate>Thu, 17 Jul 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/how-to-streamline-it-operations-with-conductorone-automations/</guid>
      <description>Learn how C1 Automations helps IT teams eliminate manual work, reduce license costs, and streamline access workflows at scale.</description>
    </item>
    <item>
      <title>Rethinking Identity for an AI-native Future</title>
      <link>https://www.c1.ai/blog/rethinking-identity-for-an-ai-native-future/</link>
      <pubDate>Tue, 15 Jul 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/rethinking-identity-for-an-ai-native-future/</guid>
      <description>SaaS is being redefined by agentic AI. This blog explores how the shift is transforming identity security, creating new challenges and opportunities for platforms built to govern at AI scale.</description>
    </item>
    <item>
      <title>How to Automate ILM with C1</title>
      <link>https://www.c1.ai/blog/how-to-automate-ilm-with-conductorone/</link>
      <pubDate>Wed, 09 Jul 2025 01:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/how-to-automate-ilm-with-conductorone/</guid>
      <description>Learn how to automate identity lifecycle management (ILM) with C1 to streamline onboarding, reduce risk, and simplify access changes across your organization.</description>
    </item>
    <item>
      <title>Inside C1&apos;s Customer-First Support Model</title>
      <link>https://www.c1.ai/blog/inside-conductorones-customer-first-support-model/</link>
      <pubDate>Tue, 01 Jul 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/inside-conductorones-customer-first-support-model/</guid>
      <description>C1’s support model is fast, hands-on, and built into the way you work. With a platform designed for ease of use and a team that’s always ready to help, we make support seamless, strategic, and human.</description>
    </item>
    <item>
      <title>The Pressure Is Real: Inside the Stress and Resilience of Today’s Security Leaders</title>
      <link>https://www.c1.ai/blog/the-pressure-is-real-inside-the-stress-and-resilience-of-security-leaders/</link>
      <pubDate>Thu, 26 Jun 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/the-pressure-is-real-inside-the-stress-and-resilience-of-security-leaders/</guid>
      <description>Explore how today’s security leaders are navigating rising identity threats, intense pressure, and limited resources—with resilience, urgency, and a mission-first mindset.</description>
    </item>
    <item>
      <title>Beyond Checking the Box: How to Use UARs for Real Security</title>
      <link>https://www.c1.ai/blog/how-to-use-uars-for-real-security/</link>
      <pubDate>Fri, 20 Jun 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/how-to-use-uars-for-real-security/</guid>
      <description>Most companies treat user access reviews (UARs) as a compliance checkbox, but that’s a missed opportunity. This blog explores how leading security teams use UARs to reduce risk, eliminate unused access, and enforce policies more effectively, with real-world examples you can implement today.</description>
    </item>
    <item>
      <title>Identity Governance vs. SaaS Management Solutions</title>
      <link>https://www.c1.ai/blog/identity-governance-vs-saas-management-solutions/</link>
      <pubDate>Tue, 17 Jun 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/identity-governance-vs-saas-management-solutions/</guid>
      <description>Many teams confuse SaaS management tools with identity governance platforms, but they solve entirely different problems. Learn why SMPs can’t secure your business and what it really takes to manage access risk.</description>
    </item>
    <item>
      <title>Managing Identity for SQL-Powered Apps: No APIs Necessary</title>
      <link>https://www.c1.ai/blog/managing-identity-for-sql-powered-apps-no-apis-necessary/</link>
      <pubDate>Thu, 12 Jun 2025 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/managing-identity-for-sql-powered-apps-no-apis-necessary/</guid>
      <description>Discover how Baton-SQL helps organizations integrate legacy and homegrown applications into their identity governance programs, no APIs or custom code required. Learn how our open-source connector enables fast, scalable access to identity and access data directly from any SQL database.</description>
    </item>
    <item>
      <title>Managing Non-Human Identity Risk in 2025</title>
      <link>https://www.c1.ai/blog/managing-nhis-in-2025/</link>
      <pubDate>Tue, 10 Jun 2025 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/managing-nhis-in-2025/</guid>
      <description>In 2025, non-human identities from service accounts to AI agents have become the fastest-growing and most urgent identity risk, forcing security teams to rethink access governance at scale. Learn more from our 2025 FIS report. </description>
    </item>
    <item>
      <title>The Cure for IGAD: Identity Governance Anxiety Disorder</title>
      <link>https://www.c1.ai/blog/the-cure-for-igad/</link>
      <pubDate>Tue, 03 Jun 2025 00:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/the-cure-for-igad/</guid>
      <description>At C1, we talk to security and IT teams every day. And we’ve noticed a troubling trend. We’re not doctors, but the symptoms are hard to ignore. After years of watching identity pros suffer in silence, we’re finally giving the condition a name: Identity Governance Anxiety Disorder. </description>
    </item>
    <item>
      <title>Key Takeaways From the 2025 Future of Identity Security Report</title>
      <link>https://www.c1.ai/blog/key-takeaways-from-the-2025-fis-report/</link>
      <pubDate>Thu, 29 May 2025 00:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/key-takeaways-from-the-2025-fis-report/</guid>
      <description>The 2025 Future of Identity Security Report reveals how security leaders are accelerating into an AI-driven era: embracing risk, scaling up identity budgets, and rethinking access for both humans and machines. Read on for key trends shaping the next wave of identity security.</description>
    </item>
    <item>
      <title>The State of Agentic AI in Identity Security</title>
      <link>https://www.c1.ai/blog/the-state-of-agentic-ai/</link>
      <pubDate>Wed, 21 May 2025 00:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/the-state-of-agentic-ai/</guid>
      <description>Security leaders aren’t just experimenting with AI—they’re rapidly integrating agentic AI into high-stakes workflows like identity provisioning and network defense. C1’s 2025 Identity Security Outlook Report reveals that urgency is driving adoption, but with thoughtful strategies and real concern for risk.</description>
    </item>
    <item>
      <title>AI in Identity and Access Management: Are You Ready?</title>
      <link>https://www.c1.ai/blog/ai-in-identity-and-access-management/</link>
      <pubDate>Wed, 14 May 2025 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/ai-in-identity-and-access-management/</guid>
      <description>While AI transforms identity and access management, it creates urgent security risks. Understand the IAM challenges posed by AI agents &amp; the path forward.</description>
    </item>
    <item>
      <title>The AI Identity Problem</title>
      <link>https://www.c1.ai/blog/the-ai-identity-problem/</link>
      <pubDate>Wed, 23 Apr 2025 12:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/the-ai-identity-problem/</guid>
      <description>AI agents are changing the identity landscape, but legacy IAM systems weren’t built for them. These fast-moving, ephemeral identities require dynamic access, machine-speed decisions, and a new model of governance. In this post, we break down the AI identity problem—and what it takes to solve it.</description>
    </item>
    <item>
      <title>The Divergent AI Landscape: Making Sense of Agentic AI</title>
      <link>https://www.c1.ai/blog/the-divergent-ai-landscape/</link>
      <pubDate>Wed, 16 Apr 2025 12:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/the-divergent-ai-landscape/</guid>
      <description>Explore the evolving world of agentic AI. Learn the three core types of AI agents—company, employee, and agent-to-agent—and the identity, security, and governance challenges they introduce.</description>
    </item>
    <item>
      <title>Is Enterprise SaaS Dying?</title>
      <link>https://www.c1.ai/blog/is-enterprise-saas-dying/</link>
      <pubDate>Tue, 15 Apr 2025 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/is-enterprise-saas-dying/</guid>
      <description>AI won’t kill enterprise SaaS—but it will force it to evolve. Learn why the real value in SaaS lies beyond code, and how platformization, expertise, and agentic AI will separate the winners from the rest.</description>
    </item>
    <item>
      <title>The Inevitable AI Wave: Modeling the AI Agent Explosion</title>
      <link>https://www.c1.ai/blog/the-inevitable-ai-wave-modeling-the-ai-agent-explosion/</link>
      <pubDate>Wed, 09 Apr 2025 11:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/the-inevitable-ai-wave-modeling-the-ai-agent-explosion/</guid>
      <description>AI agents are set to outnumber humans 25 to 1—and this blog breaks down what that means for identity and access management. Drawing from the evolution of servers to serverless, learn how companies must rethink their approach now or risk being overwhelmed by an imminent surge of short-lived, high-density AI identities.</description>
    </item>
    <item>
      <title>One Size Doesn’t Fit All: Expanding Beyond IdP-Based Provisioning</title>
      <link>https://www.c1.ai/blog/one-size-doesnt-fit-all-expanding-beyond-idp-based-provisioning/</link>
      <pubDate>Mon, 07 Apr 2025 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/one-size-doesnt-fit-all-expanding-beyond-idp-based-provisioning/</guid>
      <description>Let’s break down where IdP-based provisioning falls short and how C1 can help you expand beyond it.</description>
    </item>
    <item>
      <title>Introducing Arbitrary Access Control by C1</title>
      <link>https://www.c1.ai/blog/introducing-arbitrary-access-control-by-conductor-one/</link>
      <pubDate>Tue, 01 Apr 2025 11:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/introducing-arbitrary-access-control-by-conductor-one/</guid>
      <description>Embrace the chaos. Introducing Arbitrary Access Control: the first AI-powered access control tool designed to ignore your policies and do its own thing.</description>
    </item>
    <item>
      <title>Crawl, Walk, Run: Solving Your Identity Crisis</title>
      <link>https://www.c1.ai/blog/crawl-walk-run/</link>
      <pubDate>Thu, 20 Mar 2025 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/crawl-walk-run/</guid>
      <description>Managing identity security is increasingly complex, with blind spots, over-permissioned users, and the rise of non-human identities. A crawl, walk, run approach helps organizations gain visibility and automate identity governance for stronger security.</description>
    </item>
    <item>
      <title>One platform, Every Identity: Announcing Unified Identity Governance for Human and Non-Human Identities</title>
      <link>https://www.c1.ai/blog/announcing-unified-identity-governance/</link>
      <pubDate>Tue, 25 Feb 2025 02:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/announcing-unified-identity-governance/</guid>
      <description>Announcing Non-Human Identity Governance, a new suite of capabilities that allow C1 customers to inventory, manage, and secure NHIs and AI agents. Govern every identity—human, machine, or AI—from one unified platform. </description>
    </item>
    <item>
      <title>Some Like It Hot: IGA Hits the Big Time</title>
      <link>https://www.c1.ai/blog/iga-hits-the-big-time/</link>
      <pubDate>Thu, 13 Feb 2025 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/iga-hits-the-big-time/</guid>
      <description>This is an amazing time to be part of the identity landscape. Long ignored, identity is now seen as foundational to security — and companies are catching on, as evidenced by C1&apos;s incredible past year and the success for other identity vendors in the market. Read on to learn why everyone is suddenly embracing identity. </description>
    </item>
    <item>
      <title>CMMC: What Is It and How to Comply Using Modern Identity Governance</title>
      <link>https://www.c1.ai/blog/cmmc-compliance/</link>
      <pubDate>Mon, 06 Jan 2025 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/cmmc-compliance/</guid>
      <description>As of December 2024, all contractors and subcontractors working with the US Department of Defense must comply with the Cybersecurity Maturity Model Certification (CMMC) program to protect sensitive government information. Learn more about the CMMC and how to meet its core identity-related requirements.  </description>
    </item>
    <item>
      <title>Introducing Auditor-Ready Data Accuracy Reporting</title>
      <link>https://www.c1.ai/blog/accuracy-reporting/</link>
      <pubDate>Tue, 03 Dec 2024 12:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/accuracy-reporting/</guid>
      <description>Announcing auditor-ready data accuracy reporting — a new feature that makes proving accuracy for access reviews simple and automatic. </description>
    </item>
    <item>
      <title>The NIS2 Directive: What to Know and What It Means for Identity Security</title>
      <link>https://www.c1.ai/blog/nis2-what-to-know/</link>
      <pubDate>Sat, 30 Nov 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/nis2-what-to-know/</guid>
      <description>As of October 2024, all EU member states are required to have laws enforcing the NIS2 Directive, a cybersecurity framework aimed at protecting Europe’s critical infrastructure and services from cyberattack. Learn about NIS2, whether your business needs to comply, and best practices for meeting NIS2’s core identity security requirements.</description>
    </item>
    <item>
      <title>Designing a Great User Experience</title>
      <link>https://www.c1.ai/blog/designing-a-great-user-experience/</link>
      <pubDate>Sat, 16 Nov 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/designing-a-great-user-experience/</guid>
      <description>As we continue to add new features and deeper capabilities to C1, our product designers and software engineers have the challenging task of making the platform even simpler and more intuitive to use. Learn all about their approach to UI design and check out our latest UI updates!</description>
    </item>
    <item>
      <title>Closing the Door on Group Sprawl: Lessons from Spotnana&apos;s Security Journey</title>
      <link>https://www.c1.ai/blog/closing-the-door-on-group-sprawl/</link>
      <pubDate>Fri, 08 Nov 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/closing-the-door-on-group-sprawl/</guid>
      <description>Group sprawl is real—and a major security concern for today&apos;s companies. In our latest webinar, Ben Godard, Head of Security at Spotnana, covered the risks created by groups and how to solve them. Here are the takeaways!</description>
    </item>
    <item>
      <title>Announcing Identity Lifecycle Management</title>
      <link>https://www.c1.ai/blog/announcing-identity-lifecycle-management/</link>
      <pubDate>Mon, 23 Sep 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/announcing-identity-lifecycle-management/</guid>
      <description>Introducing identity lifecycle management, a new solution from C1 that automates access provisioning and deprovisioning for joiner, mover, and leaver workflows.</description>
    </item>
    <item>
      <title>Growing Together: A Chat with the Summer Intern C1rew</title>
      <link>https://www.c1.ai/blog/growing-together/</link>
      <pubDate>Fri, 06 Sep 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/growing-together/</guid>
      <description>Our engineering interns were integral to one of our biggest product updates this summer. Before moving on to the next steps in their degrees and careers, they chatted with us about working on the project and being part of the C1rew!</description>
    </item>
    <item>
      <title>Identity Is the New Perimeter — Here’s How to Lock It Down</title>
      <link>https://www.c1.ai/blog/identity-is-the-new-perimeter/</link>
      <pubDate>Wed, 04 Sep 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/identity-is-the-new-perimeter/</guid>
      <description>Thanks to the success of zero trust, attackers are finding it harder to execute traditional breach tactics—so they&apos;ve shifted their focus to identity. Here are practical steps you can take to shore up your defenses against identity-based attacks. </description>
    </item>
    <item>
      <title>All Aboard: Analyzing Success in Cybersecurity with Ross Haleliuk</title>
      <link>https://www.c1.ai/blog/all-aboard-with-ross-haleliuk/</link>
      <pubDate>Fri, 30 Aug 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/all-aboard-with-ross-haleliuk/</guid>
      <description>In the newest episode of the All Aboard Podcast, C1 CEO Alex Bovee is joined by Ross Haleliuk, author of Venture in Security and one of the most respected voices in the cybersecurity industry, to talk about what success in the industry means and where the industry is heading. </description>
    </item>
    <item>
      <title>How Often Should You Run User Access Reviews?</title>
      <link>https://www.c1.ai/blog/uars-frequency/</link>
      <pubDate>Tue, 27 Aug 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/uars-frequency/</guid>
      <description>Regularly reviewing who has access to your critical systems and data is an essential cybersecurity practice, but preparing and running user access reviews can be… daunting. How often should you run reviews to stay secure and compliant? And how can you make them less painful?</description>
    </item>
    <item>
      <title>Q2 Release Roundup</title>
      <link>https://www.c1.ai/blog/q2-release-roundup/</link>
      <pubDate>Thu, 22 Aug 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/q2-release-roundup/</guid>
      <description>It&apos;s August, the start of Q3! Which means it&apos;s time to take a quick look back at everything we released in the last quarter—before we hit the gas on our product plans for the rest of the year.</description>
    </item>
    <item>
      <title>Light IGA — Is It Right for You?</title>
      <link>https://www.c1.ai/blog/light-iga/</link>
      <pubDate>Sun, 18 Aug 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/light-iga/</guid>
      <description>The term “light IGA” loosely categorizes a crop of new solutions that don’t line up neatly with the traditional definition of IGA. This post covers what the term means, the wide range of light IGA tools on offer, and what companies should think about when considering light IGA options.  </description>
    </item>
    <item>
      <title>Top 5 Ways to Clean Up Your Identity and Access</title>
      <link>https://www.c1.ai/blog/5-ways-to-clean-up-identity-and-access/</link>
      <pubDate>Mon, 12 Aug 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/5-ways-to-clean-up-identity-and-access/</guid>
      <description>Most enterprises are just beginning their IAM hygiene journey, with the initial goal to achieve visibility and clean up glaring access risks. This journey can be challenging, but you can significantly enhance your organization&apos;s security posture with incremental IAM improvements.</description>
    </item>
    <item>
      <title>All Aboard: From Fear to Excitement: AI Agents in Security</title>
      <link>https://www.c1.ai/blog/all-aboard-with-nancy-wang-and-ashish-popli/</link>
      <pubDate>Tue, 06 Aug 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/all-aboard-with-nancy-wang-and-ashish-popli/</guid>
      <description>In the latest episode of the All Aboard Podcast, C1 CEO Alex Bovee talked to security veterans Nancy Wang and Ashish Popli. The trio tackles one of the hottest topics in the security industry today: AI agents. Together, they discuss the implications and promise behind these agents and the impact they think AI agents will have on the industry.</description>
    </item>
    <item>
      <title>Moving Beyond Zero Trust</title>
      <link>https://www.c1.ai/blog/moving-beyond-zero-trust/</link>
      <pubDate>Mon, 05 Aug 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/moving-beyond-zero-trust/</guid>
      <description>The security concept of zero trust has seen wide adoption in the last decade, creating real security gains—and new security challenges. We&apos;re now getting signs that zero trust alone won&apos;t be enough to combat evolving identity-based breach tactics. What will the post–zero trust era look like?</description>
    </item>
    <item>
      <title>The Growing Threat of AI-Driven Social Engineering</title>
      <link>https://www.c1.ai/blog/the-growing-threat-of-ai-driven-social-engineering/</link>
      <pubDate>Wed, 31 Jul 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/the-growing-threat-of-ai-driven-social-engineering/</guid>
      <description>Social engineering is a broad term used to characterize a set of tactics and techniques used to manipulate individuals into divulging confidential information or performing sensitive actions. These attacks have been around for years, but with the emergence of AI, the sophistication and volume of these attacks has only increased. Dive into how generative AI is going to increase the threat of social engineering, and how organizations can protect themselves against it.</description>
    </item>
    <item>
      <title>NYDFS 23 NYCRR 500 and Least Privilege Access</title>
      <link>https://www.c1.ai/blog/NYDFS-23-NYCRR-500-and-least-privilege-access/</link>
      <pubDate>Mon, 29 Jul 2024 10:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/NYDFS-23-NYCRR-500-and-least-privilege-access/</guid>
      <description>Earlier this year, amendments were made to the NYDFS 23 and NYCRR 500. Both changes reflecting a response to the significant growth in cybersecurity threats. Learn more about the these amendments, how they&apos;re related to the principle of least privilege, and how organizations can ensure compliance with them.</description>
    </item>
    <item>
      <title>Moving on from Legacy IGA—Why Users Won’t Go Back</title>
      <link>https://www.c1.ai/blog/moving-on-from-legacy-iga-why-users-wont-go-back/</link>
      <pubDate>Wed, 24 Jul 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/moving-on-from-legacy-iga-why-users-wont-go-back/</guid>
      <description>Legacy IGA solutions have been the norm in the identity space for a long time. However, these solutions are not without issues. Check out this blog post to learn more about the common challenges legacy IGA poses through real world examples.</description>
    </item>
    <item>
      <title>Five Takeaways from the Snowflake Attack</title>
      <link>https://www.c1.ai/blog/5-takeaways-from-the-snowflake-attack/</link>
      <pubDate>Mon, 22 Jul 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/5-takeaways-from-the-snowflake-attack/</guid>
      <description>Breaches are far from uncommon in the cybersecurity landscape, however, each incident can serve as a learning experience. The recent Snowflake attack serves as a similar scenario. Dive into C1 CEO Alex Bovee&apos;s thoughts on how this breach came to happen, what we can learn from it, and the best steps companies can take moving forward to prevent reoccurrences.</description>
    </item>
    <item>
      <title>Introducing Helpdesk Provisioning and Automation</title>
      <link>https://www.c1.ai/blog/introducing-helpdesk-provisioning-and-automation/</link>
      <pubDate>Wed, 17 Jul 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/introducing-helpdesk-provisioning-and-automation/</guid>
      <description>We&apos;re excited to introduce two new ways to streamline helpdesk workflows using C1 — giving customers even more flexibility in customizing our platform to suit their environment and workforce. </description>
    </item>
    <item>
      <title>All Aboard: Breaking Down Least Privilege and Zero Standing Privilege with Ian Glazer</title>
      <link>https://www.c1.ai/blog/all-aboard-with-ian-glazer/</link>
      <pubDate>Mon, 15 Jul 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/all-aboard-with-ian-glazer/</guid>
      <description>In the newest episode of the All Aboard Podcast, C1 CEO Alex Bovee is joined by Weave Identity founder and president Ian Glazer to discuss tactics for applying the concepts of least privilege and zero standing privileges to any identity security program. </description>
    </item>
    <item>
      <title>The Importance of the End User Experience</title>
      <link>https://www.c1.ai/blog/the-importance-of-the-end-user-experience/</link>
      <pubDate>Thu, 11 Jul 2024 01:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/the-importance-of-the-end-user-experience/</guid>
      <description>Companies that prioritize creating great end user experiences as part of their overall identity security program are seeing both productivity and security gains. Learn about their approach and how to build it into your own strategy. </description>
    </item>
    <item>
      <title>Announcing Access Control for Your Access Controls</title>
      <link>https://www.c1.ai/blog/announcing-access-control-for-your-access-controls/</link>
      <pubDate>Wed, 03 Jul 2024 01:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/announcing-access-control-for-your-access-controls/</guid>
      <description>We&apos;re excited to announce the ability to control access – for those who control access! C1 customers can now monitor, review, and request fine-grained entitlements for the C1 app, in the C1 app.</description>
    </item>
    <item>
      <title>All Aboard: Security Strategy for Startups with Rob Picard</title>
      <link>https://www.c1.ai/blog/all-aboard-with-rob-picard/</link>
      <pubDate>Tue, 25 Jun 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/all-aboard-with-rob-picard/</guid>
      <description>In the latest episode of the All Aboard Podcast, C1 CEO Alex Bovee talked to Rob Picard, the CEO of Observa, a consulting firm focused on helping startups develop strong security programs. Rob shared invaluable insights from his experience crafting robust security strategies tailored for early-stage companies.</description>
    </item>
    <item>
      <title>NIST CSF 2.0: What to Know</title>
      <link>https://www.c1.ai/blog/nist-csf-20-what-to-know/</link>
      <pubDate>Mon, 27 May 2024 00:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/nist-csf-20-what-to-know/</guid>
      <description>In February, the National Institute of Standards and Technology (NIST) released a major update to its cybersecurity framework (CSF), which businesses and government organizations use as guidance for mitigating cyber risks. Read on to learn what&apos;s new with NIST CSF 2.0 and how to implement its guidelines. </description>
    </item>
    <item>
      <title>The 2024 Identity Security Outlook Report</title>
      <link>https://www.c1.ai/blog/2024-identity-security-outlook-report/</link>
      <pubDate>Tue, 21 May 2024 00:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/2024-identity-security-outlook-report/</guid>
      <description>Announcing the release of the 2024 Identity Security Outlook Report! Learn security leaders&apos; top concerns and priorities for identity security, access management, and zero standing privileges in 2024. </description>
    </item>
    <item>
      <title>Announcing Access Conflicts</title>
      <link>https://www.c1.ai/blog/announcing-access-conflicts/</link>
      <pubDate>Tue, 14 May 2024 00:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/announcing-access-conflicts/</guid>
      <description>Introducing automated access conflicts monitoring and alerts! C1 customers can now proactively detect separation of duties (SoD) conflicts for enhanced security and streamlined compliance. </description>
    </item>
    <item>
      <title>All Aboard: Spicy Takes with David Lee, the Identity Jedi</title>
      <link>https://www.c1.ai/blog/all_aboard_spicy_takes_with_david_lee_the_identity_jedi/</link>
      <pubDate>Thu, 02 May 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/all_aboard_spicy_takes_with_david_lee_the_identity_jedi/</guid>
      <description>Identity security is becoming a hot topic. So C1 CEO Alex Bovee invited David Lee, the Identity Jedi, to share hot wings and spicy takes on the past, present, and future of identity security for a special edition of the All Aboard podcast. </description>
    </item>
    <item>
      <title>The SSO Tax: What It Is and Why It Sucks</title>
      <link>https://www.c1.ai/blog/the-sso-tax-what-it-is-and-why-it-sucks/</link>
      <pubDate>Fri, 26 Apr 2024 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/the-sso-tax-what-it-is-and-why-it-sucks/</guid>
      <description>In recent years, software vendors have used the importance of SSO to their advantage, building SSO-implementation fees into their pricing—a practice that’s come to be known as the “SSO Tax,&quot; a cause of major frustration for companies of all sizes and budgets.</description>
    </item>
    <item>
      <title>Announcing Support for Webhooks</title>
      <link>https://www.c1.ai/blog/announcing-support-for-webhooks/</link>
      <pubDate>Tue, 23 Apr 2024 01:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/announcing-support-for-webhooks/</guid>
      <description>We&apos;re excited to announce support for webhooks! C1 customers can now use webhooks to trigger access control workflows across their environment. </description>
    </item>
    <item>
      <title>Your Problems Aren&apos;t Unique: How to Build a Foundation Against Overprivileged Access in Any Environment</title>
      <link>https://www.c1.ai/blog/your-problems-arent-unique/</link>
      <pubDate>Thu, 11 Apr 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/your-problems-arent-unique/</guid>
      <description>Does overprivileged access keep you up at night? Learn foundational steps for reducing privileges and increasing security that work for every environment, no matter how complex or unique your challenges may seem. </description>
    </item>
    <item>
      <title>Introducing Baton Feeds</title>
      <link>https://www.c1.ai/blog/introducing-baton-feeds/</link>
      <pubDate>Wed, 03 Apr 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/introducing-baton-feeds/</guid>
      <description>Learn all about Baton feeds, Baton&apos;s newly released low-latency streaming capability. In this dev blog, we cover how feeds works, how to add it to a Baton connector, and the new functionality it enables. </description>
    </item>
    <item>
      <title>Securing America’s Ports: The Biden-Harris Initiative on Maritime Cybersecurity</title>
      <link>https://www.c1.ai/blog/securing-americas-ports/</link>
      <pubDate>Fri, 22 Mar 2024 01:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/securing-americas-ports/</guid>
      <description>The Biden-Harris administration recently announced an initiative to strengthen maritime cybersecurity. In this post, we’ll explore the key elements of the initiative and their implications for the maritime industry and industries like it.</description>
    </item>
    <item>
      <title>Introducing shadow app detection, tracking, and management in C1</title>
      <link>https://www.c1.ai/blog/introducing-shadow-app-detection-tracking-and-management-in-conductorone/</link>
      <pubDate>Tue, 19 Mar 2024 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/introducing-shadow-app-detection-tracking-and-management-in-conductorone/</guid>
      <description>We&apos;re excited to announce C1’s new shadow app functionality, which enables customers to identify and monitor logins to unauthorized apps and bring those apps under full management in the platform.</description>
    </item>
    <item>
      <title>Introducing C1&apos;s Identity Graph: Unified Identity, Access, and Authorization Across Your Complex Environment</title>
      <link>https://www.c1.ai/blog/Introducing-conductorone-access-fabric-unified-identity-access-and-authorization-across-your-complex-environment/</link>
      <pubDate>Wed, 31 Jan 2024 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/Introducing-conductorone-access-fabric-unified-identity-access-and-authorization-across-your-complex-environment/</guid>
      <description>We believe companies need comprehensive visibility into access across their systems to protect identity in today&apos;s complicated environments. C1&apos;s Identity Graph provides that unified visibility and underpins the platform&apos;s new security dashboard and powerful new search and visualization capabilities. </description>
    </item>
    <item>
      <title>NYDFS Regulation: What It Means for Access Controls and How to Comply</title>
      <link>https://www.c1.ai/blog/nydfs-regulation-what-it-means-for-access-controls-and-how-to-comply/</link>
      <pubDate>Tue, 30 Jan 2024 19:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/nydfs-regulation-what-it-means-for-access-controls-and-how-to-comply/</guid>
      <description>The NYDFS recently updated its cybersecurity regulations, requiring companies to implement stricter access controls than ever before to protect sensitive data. Learn more about the new rules and how to comply.</description>
    </item>
    <item>
      <title>Zero Trust in Practice: How We Keep Customer Data Secure at C1</title>
      <link>https://www.c1.ai/blog/zero-trust-in-practice-how-we-keep-customer-data-secure-at-conductorone/</link>
      <pubDate>Wed, 17 Jan 2024 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/zero-trust-in-practice-how-we-keep-customer-data-secure-at-conductorone/</guid>
      <description>Our company mission to “secure the workforce” guides not only how we design our platform but also our multilayered internal approach to protecting customer data. </description>
    </item>
    <item>
      <title>C1 Named a Fortune Cyber 60 Company</title>
      <link>https://www.c1.ai/blog/C1_Named_a_Fortune_Cyber_60_Company/</link>
      <pubDate>Wed, 13 Dec 2023 12:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/C1_Named_a_Fortune_Cyber_60_Company/</guid>
      <description>We’re honored to announce that C1 has been named a Fortune Cyber 60 company! This recognition underscores the dedication of our team, our traction in the market, and the strong, enduring relationships we’ve built with customers. Everyone at C1 is grateful to Fortune and Lightspeed for this prestigious accolade! </description>
    </item>
    <item>
      <title>Introducing the First AI Assistant for Identity Governance: C1 Copilot</title>
      <link>https://www.c1.ai/blog/Introducing_the_First_AI_Assistant_for_Identity_Governance_C1_Copilot/</link>
      <pubDate>Wed, 06 Dec 2023 10:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/Introducing_the_First_AI_Assistant_for_Identity_Governance_C1_Copilot/</guid>
      <description>Announcing C1’s Access Copilot, an AI assistant that changes the game for traditional identity governance. Copilot provides recommendations and automation that streamline your business and keep you more secure. </description>
    </item>
    <item>
      <title>Traditional PAM is Dead, Long Live Just in Time Access</title>
      <link>https://www.c1.ai/blog/Traditional_PAM_is_Dead_Long_Live_Just_in_Time_Access/</link>
      <pubDate>Mon, 20 Nov 2023 12:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/Traditional_PAM_is_Dead_Long_Live_Just_in_Time_Access/</guid>
      <description>For the modern, cloud-forward company, strategies for securing infrastructure and identity are changing at a breakneck pace. MFA and trditional PAM are not sufficient for securing access in the cloud. Dive into the future of PAM through least privilege and JIT access in this blog. </description>
    </item>
    <item>
      <title>Announcing Conditional Access Policies in C1</title>
      <link>https://www.c1.ai/blog/Announcing_Conditional_Access_Policies_in_C1/</link>
      <pubDate>Thu, 16 Nov 2023 08:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/Announcing_Conditional_Access_Policies_in_C1/</guid>
      <description>Announcing the launch of our new feature: Conditional Access Policies! Reduce risk, secure data, and govern access with the next step in touch free automation. Dive into conditional policies and learn more  about our mission. </description>
    </item>
    <item>
      <title>HARBleed: When History Doesn&apos;t Repeat, But It Does Rhyme</title>
      <link>https://www.c1.ai/blog/HARBleed_When_History_Doesn't_Repeat_But_It_Does_Rhyme/</link>
      <pubDate>Wed, 25 Oct 2023 12:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/HARBleed_When_History_Doesn't_Repeat_But_It_Does_Rhyme/</guid>
      <description>The cybersecurity landscape is marked by breaches that serve as learning pivots. The Okta&apos;s recent incident shares a thematic lineage with one of the most notorious security lapses in history: Heartbleed. Delve into the C1 coined concept termer &quot;HARBleed,&quot; which highlights its procedural kinship with Heartbleed and emphasizing the lurking danger represented by bearer tokens.</description>
    </item>
    <item>
      <title>Why Modern Organizations Need Next Generation IGA Webinar</title>
      <link>https://www.c1.ai/blog/the-cyberhut-why-modern-organizations-need-next-gen-iga/</link>
      <pubDate>Wed, 30 Aug 2023 12:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/the-cyberhut-why-modern-organizations-need-next-gen-iga/</guid>
      <description>How can you get visibility into all identities, let alone manage the access each user has? Simon Moffat, founder and research analyst at The CyberHut, and Alex Bovee, C1’s CEO, discuss these challenges facing the modern enterprise and more on this webinar hosted by The CyberHut. </description>
    </item>
    <item>
      <title>Announcing Our Felicis Led Series A Expansion to $27M</title>
      <link>https://www.c1.ai/blog/conductorone-expands-series-a-to-27m-felicis/</link>
      <pubDate>Tue, 08 Aug 2023 09:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/conductorone-expands-series-a-to-27m-felicis/</guid>
      <description>We are thrilled to share that C1 has expanded our Series A funding to 27M, led by venture capital firm, Felicis. Learn about all of the amazing people who helped us get here and our plans for future growth. </description>
    </item>
    <item>
      <title>Launch Week Recap</title>
      <link>https://www.c1.ai/blog/cpam-launch-week-recap/</link>
      <pubDate>Fri, 28 Jul 2023 09:30:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/cpam-launch-week-recap/</guid>
      <description>After our first successful launch week, here is a brief recap of everything we released and some future happenings just in case you missed it. </description>
    </item>
    <item>
      <title>Baton: The Open Source Fabric Powering Identity Security</title>
      <link>https://www.c1.ai/blog/baton-open-source-fabric-powering-identity-security/</link>
      <pubDate>Thu, 27 Jul 2023 09:30:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/baton-open-source-fabric-powering-identity-security/</guid>
      <description>Baton, our open-source C1 connector project, provides the connective tissue to communicate and orchestrate identity security workflows to any technology. Learn more about what we&apos;ve been working on with Baton, and how it furthers our goal of securing workforce identity.</description>
    </item>
    <item>
      <title>Announcing Cloud Privileged Access Management</title>
      <link>https://www.c1.ai/blog/announcing-cloud-privileged-access-management//</link>
      <pubDate>Wed, 26 Jul 2023 09:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/announcing-cloud-privileged-access-management//</guid>
      <description>Introducing Cloud PAM: our developer-first solution for security engineering teams to manage privileged access and grant temporary elevated access while securing the most sensitive resources and mitigating privilege abuse, as-code, from a unified access control plane. Learn all about CPAM and why we built it here. </description>
    </item>
    <item>
      <title>Announcing Hybrid Infrastructure Support </title>
      <link>https://www.c1.ai/blog/announcing-hybrid-infrastructure-support/</link>
      <pubDate>Mon, 24 Jul 2023 09:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/announcing-hybrid-infrastructure-support/</guid>
      <description>In the landscape of modern tech, companies are all at various stages of digital transformation. C1 meets you where you are with our broad range of connectors that cater to cloud applications, backoffice and homegrown systems. </description>
    </item>
    <item>
      <title>Redefining Identity Security: C1&apos;s Inclusion in the InfraRed 100</title>
      <link>https://www.c1.ai/blog/inclusion-in-the-infrared-100/</link>
      <pubDate>Wed, 19 Jul 2023 09:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/inclusion-in-the-infrared-100/</guid>
      <description>We are thrilled to share that C1 has been recognized as one of Redpoint Venture Capital&apos;s InfraRed 100 list.  </description>
    </item>
    <item>
      <title>C1 … 2.0: An update to our values.</title>
      <link>https://www.c1.ai/blog/conductorone-2.0-values-update/</link>
      <pubDate>Thu, 01 Jun 2023 10:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/conductorone-2.0-values-update/</guid>
      <description>With great thought and consideration, we  have debated, collaborated, and eventually refined our company values and are excited to share our updated version! </description>
    </item>
    <item>
      <title>Embracing the SaaS Mindset: &quot;There&apos;s an App for That&quot;</title>
      <link>https://www.c1.ai/blog/there's-an-app-for-that/</link>
      <pubDate>Wed, 26 Apr 2023 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/there's-an-app-for-that/</guid>
      <description>&quot;There&apos;s an app for that&quot; has become the new norm to navigate the growing software ecosystem. Automation is key to finding this balance.</description>
    </item>
    <item>
      <title>Rethinking Access Management: Centralization vs. Decentralization</title>
      <link>https://www.c1.ai/blog/rethinking-access-management/</link>
      <pubDate>Tue, 18 Apr 2023 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/rethinking-access-management/</guid>
      <description>Rethinking access management and finding a balance between centralization and decentralization is vital to ensure your organization remains responsive to these changes. </description>
    </item>
    <item>
      <title>Inside Scoop with Ramp&apos;s Head of Security Assurance</title>
      <link>https://www.c1.ai/blog/inside-scoop-paul-yoo/</link>
      <pubDate>Fri, 31 Mar 2023 19:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/inside-scoop-paul-yoo/</guid>
      <description>Hear the inside scoop on, the Head of Security Assurance at Ramp, Paul Yoo&apos;s journey to finding C1 and how the partnership has changed the way Ramp achieves compliance. Learn more about Ramp&apos;s journey and hear from Paul himself on how C1 has saved him and his team time and effort on exceeding security goals.  </description>
    </item>
    <item>
      <title>The Great Convergence of IT and Security</title>
      <link>https://www.c1.ai/blog/great-convergence-it-security/</link>
      <pubDate>Thu, 30 Mar 2023 15:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/great-convergence-it-security/</guid>
      <description>The lines between IT and Security are becoming increasingly indistinct. This convergence is fostering a new era of collaboration, adaptability, and shared responsibility. Hear our CTO Paul Querna&apos;s thoughts on this complex topic and his outlook on the future of the current security climate. </description>
    </item>
    <item>
      <title>Secrets, Key Rotation, and the Role of Automation</title>
      <link>https://www.c1.ai/blog/secrets-keyrotation-automation/</link>
      <pubDate>Fri, 24 Mar 2023 14:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/secrets-keyrotation-automation/</guid>
      <description>GitHub&apos;s accidental leak of their SSH RSA server private key sheds light on security best practices. What can we do to prevent other such breaches and increase our security posture. Our CTO Paul Querna gives his take. </description>
    </item>
    <item>
      <title>Continuing the Journey to Least Privilege: Introducing Access Requests</title>
      <link>https://www.c1.ai/blog/continuing-journey-to-least-privilege-introducing-access-requests/</link>
      <pubDate>Wed, 08 Mar 2023 15:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/continuing-journey-to-least-privilege-introducing-access-requests/</guid>
      <description>Introducing Access Requests: Self-service access requests for your employees via Slack or a web catalog, automatic approval routing, and just-in-time provisioning.</description>
    </item>
    <item>
      <title>Reimagining Identity Governance</title>
      <link>https://www.c1.ai/blog/reimagining-identity-governance/</link>
      <pubDate>Fri, 03 Mar 2023 16:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/reimagining-identity-governance/</guid>
      <description>Alex Bovee had the opportunity to speak with Lisa Cook from ISACA to discuss all things identity. Hear the full recording and learn more about their views on modern businesses and bridging the gap between compliance measures and security outcomes. </description>
    </item>
    <item>
      <title>How to Roll Out Passkeys and Block Phishing Attacks</title>
      <link>https://www.c1.ai/blog/passkeys-block-attacks/</link>
      <pubDate>Wed, 01 Mar 2023 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/passkeys-block-attacks/</guid>
      <description>Moving to phishing and social engineering proof authenticators is a must. One of the most effective ways to implement this is through physical passkeys. In this practical guide, learn more about the key steps to roll out physical passkeys for your company. </description>
    </item>
    <item>
      <title>Making Sense of the Users, Accounts, and Access in your SaaS and IaaS Apps with a Unified Directory</title>
      <link>https://www.c1.ai/blog/announcing-new-unified-directory-feature/</link>
      <pubDate>Tue, 28 Feb 2023 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/announcing-new-unified-directory-feature/</guid>
      <description>We have taken identity a step further with our new feature - unified directories! Learn more about how this new feature provides a single, consolidated source of truth for all humans that interact with your organization.</description>
    </item>
    <item>
      <title>Travis McPeak, CEO and Co-Founder of Resourcely, on Shifting DevSecOps Left and Making Developers More Productive</title>
      <link>https://www.c1.ai/blog/interview-travis-mcpeak/</link>
      <pubDate>Fri, 24 Feb 2023 20:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/interview-travis-mcpeak/</guid>
      <description>The first in our video interview series, Alex Bovee had the opportunity to talk with Travis McPeak about emerging trends in security, compliance, and platform engineering. </description>
    </item>
    <item>
      <title>When Attacks Go … Well? Key Takeaways From the Reddit Hack</title>
      <link>https://www.c1.ai/blog/takeaways-reddit-hack/</link>
      <pubDate>Wed, 15 Feb 2023 16:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/takeaways-reddit-hack/</guid>
      <description>Phishing has become increasingly prevalent, as seen in Reddit&apos;s  account compromise last week, and standing privileges and sensitive access pose significant risks. We need to shift to zero standing privileges to secure our access and infrastructure. </description>
    </item>
    <item>
      <title> SOC2 and Least Privilege Access Control</title>
      <link>https://www.c1.ai/blog/SOC2-and-least-privilege-access-control/</link>
      <pubDate>Wed, 01 Feb 2023 15:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/SOC2-and-least-privilege-access-control/</guid>
      <description>Least privilege access control has become the guiding principle for granting ass for SOC 2 compliance, but it can seem daunting to tackle this challenge with so much gray area. Learn how can you practically implement least privilege access controls.</description>
    </item>
    <item>
      <title>When Threat Models Collide</title>
      <link>https://www.c1.ai/blog/when-threat-models-collide/</link>
      <pubDate>Fri, 27 Jan 2023 15:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/when-threat-models-collide/</guid>
      <description>Insider and outsider threats are starting to look the same - hackers are stealing identities or logged in sessions. Our approach to a solution? A pragmatic least privilege maturity curve.</description>
    </item>
    <item>
      <title>ChatGPT and How AI will Impact Security</title>
      <link>https://www.c1.ai/blog/chatgpt-how-ai-will-impact-security/</link>
      <pubDate>Fri, 06 Jan 2023 16:26:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/chatgpt-how-ai-will-impact-security/</guid>
      <description>Thoughts on ChatGPT, AI, and the long ranging security impacts - especially to phishing and social engineering based attacks.</description>
    </item>
    <item>
      <title>Baton and the Journey to Identity Security and Unified Access Control</title>
      <link>https://www.c1.ai/blog/baton-journey-to-identity-security-and-unified-access/</link>
      <pubDate>Tue, 06 Dec 2022 16:26:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/baton-journey-to-identity-security-and-unified-access/</guid>
      <description>To realize our vision of securing workforce identity, we needed to be able to connect to any technology, anywhere – and this required a new approach. Baton is our answer.</description>
    </item>
    <item>
      <title>Technical Deep Dive: Using Baton to Audit Infrastructure Access</title>
      <link>https://www.c1.ai/blog/technical-deep-dive-using-baton-to-audit-infrastructure-access/</link>
      <pubDate>Tue, 06 Dec 2022 16:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/technical-deep-dive-using-baton-to-audit-infrastructure-access/</guid>
      <description>Getting started with Baton: how to extract, normalize, and interact with identity data using open source Baton connectors.</description>
    </item>
    <item>
      <title>Announcing Baton, an Open Source Toolkit for Auditing Infrastructure User Access</title>
      <link>https://www.c1.ai/blog/announcing-baton-open-source-for-auditing-infrastructure-access/</link>
      <pubDate>Tue, 06 Dec 2022 15:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/announcing-baton-open-source-for-auditing-infrastructure-access/</guid>
      <description>Announcing Baton, the first open source toolkit to extract, normalize, and interact with identity data from any app, with a standardized but extensible data model.</description>
    </item>
    <item>
      <title>Achieve Least Privilege Access with C1 + Okta</title>
      <link>https://www.c1.ai/blog/C1+Okta/</link>
      <pubDate>Mon, 07 Nov 2022 08:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/C1+Okta/</guid>
      <description>Learn how organizations using Okta can supercharge their IAM security strategy and achieve least privilege access with C1</description>
    </item>
    <item>
      <title>How to Be SOC2 Compliant: A Checklist for Security Teams</title>
      <link>https://www.c1.ai/blog/how-to-be-soc2-compliant-checklist-for-security-teams/</link>
      <pubDate>Wed, 02 Nov 2022 17:52:42 GMT</pubDate>
      <guid>https://www.c1.ai/blog/how-to-be-soc2-compliant-checklist-for-security-teams/</guid>
      <description>Your first SOC2 audit can seem daunting. Use this checklist to build a strong security strategy that will put you on the right path to compliance.</description>
    </item>
    <item>
      <title>Birthright Access is Broken</title>
      <link>https://www.c1.ai/blog/birthright-access-is-broken/</link>
      <pubDate>Thu, 27 Oct 2022 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/birthright-access-is-broken/</guid>
      <description>Birthright access is an anti-pattern for secure, least privilege access control.</description>
    </item>
    <item>
      <title>Running Your UAR Campaigns: Product Deep Dive</title>
      <link>https://www.c1.ai/blog/running-uar-campaigns-deep-dive/</link>
      <pubDate>Thu, 27 Oct 2022 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/running-uar-campaigns-deep-dive/</guid>
      <description>Following our last post on scoping UARs with C1, today we&apos;re diving into running the campaign, the reviewer experience, and reporting out to auditors.</description>
    </item>
    <item>
      <title>Architecting Zero Trust: Twingate + C1</title>
      <link>https://www.c1.ai/blog/architecting-zero-trust-twingate-conductorone/</link>
      <pubDate>Tue, 25 Oct 2022 14:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/architecting-zero-trust-twingate-conductorone/</guid>
      <description>Twingate and C1 partnered to provide customers with a Zero Trust solution that gives you just-in-time, time-based remote access to your private resources and networks.</description>
    </item>
    <item>
      <title>Scoping Your UAR Campaigns: Product Deep Dive</title>
      <link>https://www.c1.ai/blog/scoping-uar-campaigns-deep-dive/</link>
      <pubDate>Thu, 20 Oct 2022 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/scoping-uar-campaigns-deep-dive/</guid>
      <description>We&apos;re breaking down and exposing all of our product functionality so you can see how easy it is to scope and set up a UAR campaign with C1.</description>
    </item>
    <item>
      <title>Best Practices for More Secure AWS IAM</title>
      <link>https://www.c1.ai/blog/more-secure-aws-iam-best-practices/</link>
      <pubDate>Tue, 18 Oct 2022 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/more-secure-aws-iam-best-practices/</guid>
      <description>AWS IAM can be unwieldy–setting up permissions is complicated and can leave gaps in security when unnecessary access is granted. Learn how to make AWS IAM more secure with best practices for least privilege access controls.</description>
    </item>
    <item>
      <title>Automating Compliance Controls to Achieve Least Privilege Access</title>
      <link>https://www.c1.ai/blog/automating-compliance-controls-least-privilege-access/</link>
      <pubDate>Wed, 12 Oct 2022 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/automating-compliance-controls-least-privilege-access/</guid>
      <description>Modern security teams are automating traditional compliance controls to reduce the risk posture for an organization – what we&apos;re calling security-led governance.</description>
    </item>
    <item>
      <title>Dancin’ in September: What’s New in C1</title>
      <link>https://www.c1.ai/blog/2022-09-whats-new-sept22/</link>
      <pubDate>Fri, 30 Sep 2022 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/2022-09-whats-new-sept22/</guid>
      <description>C1 is excited to announce new features, including: OneLogin, Azure AD and Ramp connectors, as well as delegated provisioning for entitlements.</description>
    </item>
    <item>
      <title>Hot Summer, Cool New Features: What’s New in C1</title>
      <link>https://www.c1.ai/blog/2022-08-whats-new-summer22/</link>
      <pubDate>Thu, 25 Aug 2022 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/2022-08-whats-new-summer22/</guid>
      <description>C1 is excited to announce new features, including: a Salesforce connector, Slack reminders for access review tasks, and the ability to connect Amazon S3 datasources.</description>
    </item>
    <item>
      <title>Implementing Least Privilege Access: Tailscale + C1</title>
      <link>https://www.c1.ai/blog/implementing-least-privilege-access-tailscale-conductorone/</link>
      <pubDate>Tue, 02 Aug 2022 15:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/implementing-least-privilege-access-tailscale-conductorone/</guid>
      <description>C1 gives you the power to automate Tailscale access requests, build custom automated access review workflows, and pull audit reports in a few clicks.</description>
    </item>
    <item>
      <title>C1 at Black Hat: Future Proofing Workforce Security</title>
      <link>https://www.c1.ai/blog/conductorone-blackhat-usa-2022/</link>
      <pubDate>Tue, 26 Jul 2022 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/conductorone-blackhat-usa-2022/</guid>
      <description>Meet C1 at Black Hat and learn about the future of identity governance.</description>
    </item>
    <item>
      <title>Buckle Up! C1 Raises $15M In Series A Funding to Solve Identity Security Challenges</title>
      <link>https://www.c1.ai/blog/conductorone-raises-15m-series-a-to-solve-identity-security-challenges/</link>
      <pubDate>Thu, 23 Jun 2022 13:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/conductorone-raises-15m-series-a-to-solve-identity-security-challenges/</guid>
      <description>We are thrilled to share that C1 has raised our Series A.</description>
    </item>
    <item>
      <title>Announcing our SOC2 Type 2 Certification</title>
      <link>https://www.c1.ai/blog/announcing-our-soc2-type2-certification/</link>
      <pubDate>Fri, 03 Jun 2022 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/announcing-our-soc2-type2-certification/</guid>
      <description>We are proud to announce that C1 has received SOC2 Type 2 certification.</description>
    </item>
    <item>
      <title>Least Privilege Access: What You Need to Know</title>
      <link>https://www.c1.ai/blog/what-is-least-privilege-access/</link>
      <pubDate>Thu, 19 May 2022 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/what-is-least-privilege-access/</guid>
      <description>As one of the core tenants of zero trust, least privilege access is probably the least understood and the hardest to reach today. At the highest level, think of least privilege access as providing people – or identities more generally – the access they need to do a job, and for no longer than they need it.</description>
    </item>
    <item>
      <title>Access Control: Taming Group Sprawl</title>
      <link>https://www.c1.ai/blog/access-control-taming-group-sprawl/</link>
      <pubDate>Thu, 05 May 2022 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/access-control-taming-group-sprawl/</guid>
      <description>IT, Security, and GRC teams have long held a love-hate relationship with directory groups. Groups enabled companies to scale permissions for a time, but the proliferation of directory groups is now causing major headaches for security. </description>
    </item>
    <item>
      <title>4 Tips for Crafting Your Startup’s Values</title>
      <link>https://www.c1.ai/blog/startup-values/</link>
      <pubDate>Thu, 03 Jun 2021 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/startup-values/</guid>
      <description>Company values are critical to early-stage startups. Here are four tips that helped guide C1.</description>
    </item>
    <item>
      <title>What’s Next for Zero Trust?</title>
      <link>https://www.c1.ai/blog/after-zero-trust/</link>
      <pubDate>Wed, 26 May 2021 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/after-zero-trust/</guid>
      <description>Zero Trust is accepted as a superior technical security architecture for the world outside of the corporate network. So what comes next?</description>
    </item>
    <item>
      <title>Announcing C1’s $5M Seed Funding</title>
      <link>https://www.c1.ai/blog/conductorone-seed-funding/</link>
      <pubDate>Mon, 05 Apr 2021 13:30:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/conductorone-seed-funding/</guid>
      <description>Today we’re announcing that C1 has secured $5M in seed funding, in a round led by Accel, and joined by Fuel Capital, Active Capital, and Fathom Capital.</description>
    </item>
    <item>
      <title>Why Identity Needs to Shift Left</title>
      <link>https://www.c1.ai/blog/shift-left-identity/</link>
      <pubDate>Wed, 31 Mar 2021 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/shift-left-identity/</guid>
      <description>“Shifting left” has become a critical mindset to fix problems in modern security practice that have remained unsolved, despite increased governance and visibility. </description>
    </item>
    <item>
      <title>The Company We’re Building at C1</title>
      <link>https://www.c1.ai/blog/company-values/</link>
      <pubDate>Sun, 21 Mar 2021 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/company-values/</guid>
      <description>At C1, we&apos;ve wanted to be intentional from day one, especially about our company values.
</description>
    </item>
    <item>
      <title>Hi, We&apos;re C1</title>
      <link>https://www.c1.ai/blog/introducing-conductor-one/</link>
      <pubDate>Tue, 13 Oct 2020 07:00:00 GMT</pubDate>
      <guid>https://www.c1.ai/blog/introducing-conductor-one/</guid>
      <description>&lt;p&gt;We’re excited to tell you about our new company: C1. We’re on a mission to unify permission management for the web and modern infrastructure. &lt;/p&gt;</description>
    </item>
  </channel>
</rss>