ConductorOne is now C1

Blog

Insights on identity security, access governance, and modern IGA.

  • When Attacks Go … Well? Key Takeaways From the Reddit Hack
    • Insights

    When Attacks Go … Well? Key Takeaways From the Reddit Hack

    ·Alex Bovee
    Phishing has become increasingly prevalent, as seen in Reddit's account compromise last week, and standing privileges and sensitive access pose significant risks. We need to shift to zero standing privileges to secure our access and infrastructure.
  •  SOC2 and Least Privilege Access Control
    • C1 PERSPECTIVES

    SOC2 and Least Privilege Access Control

    ·Alex Bovee
    Least privilege access control has become the guiding principle for granting ass for SOC 2 compliance, but it can seem daunting to tackle this challenge with so much gray area. Learn how can you practically implement least privilege access controls.
  • When Threat Models Collide
    • C1 PERSPECTIVES

    When Threat Models Collide

    ·Paul Querna
    Insider and outsider threats are starting to look the same - hackers are stealing identities or logged in sessions. Our approach to a solution? A pragmatic least privilege maturity curve.
  • ChatGPT and How AI will Impact Security
    • C1 PERSPECTIVES

    ChatGPT and How AI will Impact Security

    ·Alex Bovee
    Thoughts on ChatGPT, AI, and the long ranging security impacts - especially to phishing and social engineering based attacks.
  • Baton and the Journey to Identity Security and Unified Access Control
    • BATON

    Baton and the Journey to Identity Security and Unified Access Control

    ·Alex Bovee
    To realize our vision of securing workforce identity, we needed to be able to connect to any technology, anywhere – and this required a new approach. Baton is our answer.
  • Technical Deep Dive: Using Baton to Audit Infrastructure Access
    • BATON

    Technical Deep Dive: Using Baton to Audit Infrastructure Access

    ·John Degner
    Getting started with Baton: how to extract, normalize, and interact with identity data using open source Baton connectors.
  • Announcing Baton, an Open Source Toolkit for Auditing Infrastructure User Access
    • Company

    Announcing Baton, an Open Source Toolkit for Auditing Infrastructure User Access

    ·Paul Querna
    Announcing Baton, the first open source toolkit to extract, normalize, and interact with identity data from any app, with a standardized but extensible data model.
  • Achieve Least Privilege Access with C1 + Okta
    • C1 PERSPECTIVES

    Achieve Least Privilege Access with C1 + Okta

    ·Samira Kahangi
    Learn how organizations using Okta can supercharge their IAM security strategy and achieve least privilege access with C1
  • How to Be SOC2 Compliant: A Checklist for Security Teams
    • C1 Perspectives

    How to Be SOC2 Compliant: A Checklist for Security Teams

    ·Shanelle Rucker
    Your first SOC2 audit can seem daunting. Use this checklist to build a strong security strategy that will put you on the right path to compliance.