Ship AI without shipping risk.

Blog

Insights on identity security, access governance, and modern IGA.

  • NIST’s New Cyber AI Profile Signals a Shift: AI Security Starts With Identity

    NIST’s New Cyber AI Profile Signals a Shift: AI Security Starts With Identity

    ·Claire McKenna
    NIST released a new Cyber AI Profile outlining how to secure AI at scale. See why identity is central to AI security and what teams must do next.
  • Identity Becomes the Battlefield: 3 Cybersecurity Predictions for 2026

    Identity Becomes the Battlefield: 3 Cybersecurity Predictions for 2026

    ·Kevin Paige
    Identity becomes the top cybersecurity risk in 2026. Explore three predictions on identity security, agentic AI, and IAM consolidation.
  • How Dynamic Access Enables Least Privilege

    How Dynamic Access Enables Least Privilege

    ·Claire McKenna
    See how C1 enables dynamic access control using real-time context to grant and revoke access as work changes.
  • December Product Wrap-Up

    December Product Wrap-Up

    ·Erin Duncan
    December product updates focused on better UX, faster access reviews, stronger insights, and expanded connectors to help identity governance scale.
  • Access Profiles: A Smarter Way to Manage and Provision Access

    Access Profiles: A Smarter Way to Manage and Provision Access

    ·Claire McKenna
    Learn what access profiles are in C1, how they group entitlements, enable automation, and simplify access requests, reviews, and onboarding at scale.
  • Incremental Sync: How C1 Keeps Identity Data Fresh in Real Time

    Incremental Sync: How C1 Keeps Identity Data Fresh in Real Time

    ·Claire McKenna
    Learn how C1’s incremental sync keeps identity and access data fresh using event-based updates for real-time identity governance.
  • Risks of Weak Identity Governance in 2026

    Risks of Weak Identity Governance in 2026

    ·Claire McKenna
    Identity is the fastest-growing attack surface in 2026. See how weak identity governance, manual UARs, and AI agents increase risk.
  • Human vs. Non-Human Identities Explained

    Human vs. Non-Human Identities Explained

    ·Claire McKenna
    Discover how non-human identities like service accounts and AI agents work, why they create new security risks, and how to govern them effectively.
  • Identity Maturity in 2026: How the Best Teams Move Forward

    Identity Maturity in 2026: How the Best Teams Move Forward

    ·Claire McKenna
    Learn how leading teams build visibility, governance, and automation to reduce risk and scale securely.