Blog
Insights on identity security, access governance, and modern IGA.

C1 Named a Fortune Cyber 60 Company
·Alex Bovee
We’re honored to announce that C1 has been named a Fortune Cyber 60 company! This recognition underscores the dedication of our team, our traction in the market, and the strong, enduring relationships we’ve built with customers. Everyone at C1 is grateful to Fortune and Lightspeed for this prestigious accolade!


Traditional PAM is Dead, Long Live Just in Time Access
·Alex Bovee
For the modern, cloud-forward company, strategies for securing infrastructure and identity are changing at a breakneck pace. MFA and trditional PAM are not sufficient for securing access in the cloud. Dive into the future of PAM through least privilege and JIT access in this blog.


HARBleed: When History Doesn't Repeat, But It Does Rhyme
·Paul Querna
The cybersecurity landscape is marked by breaches that serve as learning pivots. The Okta's recent incident shares a thematic lineage with one of the most notorious security lapses in history: Heartbleed. Delve into the C1 coined concept termer "HARBleed," which highlights its procedural kinship with Heartbleed and emphasizing the lurking danger represented by bearer tokens.

Why Modern Organizations Need Next Generation IGA Webinar
·Kate Cheney
How can you get visibility into all identities, let alone manage the access each user has? Simon Moffat, founder and research analyst at The CyberHut, and Alex Bovee, C1’s CEO, discuss these challenges facing the modern enterprise and more on this webinar hosted by The CyberHut.



Baton: The Open Source Fabric Powering Identity Security
·Paul Querna
Baton, our open-source C1 connector project, provides the connective tissue to communicate and orchestrate identity security workflows to any technology. Learn more about what we've been working on with Baton, and how it furthers our goal of securing workforce identity.