Ship AI without shipping risk.

Blog

Insights on identity security, access governance, and modern IGA.

  • Continuing the Journey to Least Privilege: Introducing Access Requests

    Continuing the Journey to Least Privilege: Introducing Access Requests

    ·Marissa Endres
    Introducing Access Requests: Self-service access requests for your employees via Slack or a web catalog, automatic approval routing, and just-in-time provisioning.
  • Reimagining Identity Governance

    Reimagining Identity Governance

    ·Alex Bovee
    Alex Bovee had the opportunity to speak with Lisa Cook from ISACA to discuss all things identity. Hear the full recording and learn more about their views on modern businesses and bridging the gap between compliance measures and security outcomes.
  • How to Roll Out Passkeys and Block Phishing Attacks

    How to Roll Out Passkeys and Block Phishing Attacks

    ·Alex Bovee
    Moving to phishing and social engineering proof authenticators is a must. One of the most effective ways to implement this is through physical passkeys. In this practical guide, learn more about the key steps to roll out physical passkeys for your company.
  • Making Sense of the Users, Accounts, and Access in your SaaS and IaaS Apps with a Unified Directory

    Making Sense of the Users, Accounts, and Access in your SaaS and IaaS Apps with a Unified Directory

    ·Alex Bovee
    We have taken identity a step further with our new feature - unified directories! Learn more about how this new feature provides a single, consolidated source of truth for all humans that interact with your organization.
  • Travis McPeak, CEO and Co-Founder of Resourcely, on Shifting DevSecOps Left and Making Developers More Productive

    Travis McPeak, CEO and Co-Founder of Resourcely, on Shifting DevSecOps Left and Making Developers More Productive

    ·Kate Cheney
    The first in our video interview series, Alex Bovee had the opportunity to talk with Travis McPeak about emerging trends in security, compliance, and platform engineering.
  • When Attacks Go … Well? Key Takeaways From the Reddit Hack

    When Attacks Go … Well? Key Takeaways From the Reddit Hack

    ·Alex Bovee
    Phishing has become increasingly prevalent, as seen in Reddit's account compromise last week, and standing privileges and sensitive access pose significant risks. We need to shift to zero standing privileges to secure our access and infrastructure.
  •  SOC2 and Least Privilege Access Control

    SOC2 and Least Privilege Access Control

    ·Alex Bovee
    Least privilege access control has become the guiding principle for granting ass for SOC 2 compliance, but it can seem daunting to tackle this challenge with so much gray area. Learn how can you practically implement least privilege access controls.
  • When Threat Models Collide

    When Threat Models Collide

    ·Paul Querna
    Insider and outsider threats are starting to look the same - hackers are stealing identities or logged in sessions. Our approach to a solution? A pragmatic least privilege maturity curve.
  • ChatGPT and How AI will Impact Security

    ChatGPT and How AI will Impact Security

    ·Alex Bovee
    Thoughts on ChatGPT, AI, and the long ranging security impacts - especially to phishing and social engineering based attacks.