Blog
Insights on identity security, access governance, and modern IGA.


Light IGA — Is It Right for You?
·Brittany Smail
The term “light IGA” loosely categorizes a crop of new solutions that don’t line up neatly with the traditional definition of IGA. This post covers what the term means, the wide range of light IGA tools on offer, and what companies should think about when considering light IGA options.

Top 5 Ways to Clean Up Your Identity and Access
·Marissa Endres
Most enterprises are just beginning their IAM hygiene journey, with the initial goal to achieve visibility and clean up glaring access risks. This journey can be challenging, but you can significantly enhance your organization's security posture with incremental IAM improvements.

All Aboard: From Fear to Excitement: AI Agents in Security
·Ishaan Banta
In the latest episode of the All Aboard Podcast, C1 CEO Alex Bovee talked to security veterans Nancy Wang and Ashish Popli. The trio tackles one of the hottest topics in the security industry today: AI agents. Together, they discuss the implications and promise behind these agents and the impact they think AI agents will have on the industry.

Moving Beyond Zero Trust
·Brittany Smail
The security concept of zero trust has seen wide adoption in the last decade, creating real security gains—and new security challenges. We're now getting signs that zero trust alone won't be enough to combat evolving identity-based breach tactics. What will the post–zero trust era look like?

The Growing Threat of AI-Driven Social Engineering
·Alex Bovee
Social engineering is a broad term used to characterize a set of tactics and techniques used to manipulate individuals into divulging confidential information or performing sensitive actions. These attacks have been around for years, but with the emergence of AI, the sophistication and volume of these attacks has only increased. Dive into how generative AI is going to increase the threat of social engineering, and how organizations can protect themselves against it.

NYDFS 23 NYCRR 500 and Least Privilege Access
·Alex Bovee
Earlier this year, amendments were made to the NYDFS 23 and NYCRR 500. Both changes reflecting a response to the significant growth in cybersecurity threats. Learn more about the these amendments, how they're related to the principle of least privilege, and how organizations can ensure compliance with them.


Five Takeaways from the Snowflake Attack
·Alex Bovee
Breaches are far from uncommon in the cybersecurity landscape, however, each incident can serve as a learning experience. The recent Snowflake attack serves as a similar scenario. Dive into C1 CEO Alex Bovee's thoughts on how this breach came to happen, what we can learn from it, and the best steps companies can take moving forward to prevent reoccurrences.