Blog
Insights on identity security, access governance, and modern IGA.


- Company
Introducing C1's Identity Graph: Unified Identity, Access, and Authorization Across Your Complex Environment
·Marissa Endres
We believe companies need comprehensive visibility into access across their systems to protect identity in today's complicated environments. C1's Identity Graph provides that unified visibility and underpins the platform's new security dashboard and powerful new search and visualization capabilities.

- Insights
NYDFS Regulation: What It Means for Access Controls and How to Comply
·Brittany Smail
The NYDFS recently updated its cybersecurity regulations, requiring companies to implement stricter access controls than ever before to protect sensitive data. Learn more about the new rules and how to comply.


- COMPANY
C1 Named a Fortune Cyber 60 Company
·Alex Bovee
We’re honored to announce that C1 has been named a Fortune Cyber 60 company! This recognition underscores the dedication of our team, our traction in the market, and the strong, enduring relationships we’ve built with customers. Everyone at C1 is grateful to Fortune and Lightspeed for this prestigious accolade!


- C1 PERSPECTIVES
Traditional PAM is Dead, Long Live Just in Time Access
·Alex Bovee
For the modern, cloud-forward company, strategies for securing infrastructure and identity are changing at a breakneck pace. MFA and trditional PAM are not sufficient for securing access in the cloud. Dive into the future of PAM through least privilege and JIT access in this blog.


- C1 PERSPECTIVES
HARBleed: When History Doesn't Repeat, But It Does Rhyme
·Paul Querna
The cybersecurity landscape is marked by breaches that serve as learning pivots. The Okta's recent incident shares a thematic lineage with one of the most notorious security lapses in history: Heartbleed. Delve into the C1 coined concept termer "HARBleed," which highlights its procedural kinship with Heartbleed and emphasizing the lurking danger represented by bearer tokens.