Blog
Insights on identity security, access governance, and modern IGA.



The Inevitable AI Wave: Modeling the AI Agent Explosion
·Paul Querna
AI agents are set to outnumber humans 25 to 1—and this blog breaks down what that means for identity and access management. Drawing from the evolution of servers to serverless, learn how companies must rethink their approach now or risk being overwhelmed by an imminent surge of short-lived, high-density AI identities.



Crawl, Walk, Run: Solving Your Identity Crisis
·Claire McKenna
Managing identity security is increasingly complex, with blind spots, over-permissioned users, and the rise of non-human identities. A crawl, walk, run approach helps organizations gain visibility and automate identity governance for stronger security.

One platform, Every Identity: Announcing Unified Identity Governance for Human and Non-Human Identities
·Brittany Smail
Announcing Non-Human Identity Governance, a new suite of capabilities that allow C1 customers to inventory, manage, and secure NHIs and AI agents. Govern every identity—human, machine, or AI—from one unified platform.

Some Like It Hot: IGA Hits the Big Time
·Greg Howard
This is an amazing time to be part of the identity landscape. Long ignored, identity is now seen as foundational to security — and companies are catching on, as evidenced by C1's incredible past year and the success for other identity vendors in the market. Read on to learn why everyone is suddenly embracing identity.

CMMC: What Is It and How to Comply Using Modern Identity Governance
·Brittany Smail
As of December 2024, all contractors and subcontractors working with the US Department of Defense must comply with the Cybersecurity Maturity Model Certification (CMMC) program to protect sensitive government information. Learn more about the CMMC and how to meet its core identity-related requirements.