Inside DigitalOcean’s SOX Compliance Playbook
  • /images/copy-of-c1-resource-graphics-17.png

    Continuing the Journey to Least Privilege: Introducing Access Requests

    ·
    Marissa Endres
    Introducing Access Requests: Self-service access requests for your employees via Slack or a web catalog, automatic approval routing, and just-in-time provisioning.
  • /images/copy-of-c1-resource-graphics-11.png

    Reimagining Identity Governance

    ·
    Alex Bovee
    Alex Bovee had the opportunity to speak with Lisa Cook from ISACA to discuss all things identity. Hear the full recording and learn more about their views on modern businesses and bridging the gap between compliance measures and security outcomes.
  • /images/copy-of-c1-resource-graphics-14.png

    How to Roll Out Passkeys and Block Phishing Attacks

    ·
    Alex Bovee
    Moving to phishing and social engineering proof authenticators is a must. One of the most effective ways to implement this is through physical passkeys. In this practical guide, learn more about the key steps to roll out physical passkeys for your company.
  • /images/copy-of-c1-resource-graphics-15.png

    Making Sense of the Users, Accounts, and Access in your SaaS and IaaS Apps with a Unified Directory

    ·
    Alex Bovee
    We have taken identity a step further with our new feature - unified directories! Learn more about how this new feature provides a single, consolidated source of truth for all humans that interact with your organization.
  • /images/shift-left-on-identity-travis-mcpeak-01.jpg

    Travis McPeak, CEO and Co-Founder of Resourcely, on Shifting DevSecOps Left and Making Developers More Productive

    ·
    Kate Cheney
    The first in our video interview series, Alex Bovee had the opportunity to talk with Travis McPeak about emerging trends in security, compliance, and platform engineering.
  • /images/copy-of-c1-resource-graphics-13.png

    When Attacks Go … Well? Key Takeaways From the Reddit Hack

    ·
    Alex Bovee
    Phishing has become increasingly prevalent, as seen in Reddit's account compromise last week, and standing privileges and sensitive access pose significant risks. We need to shift to zero standing privileges to secure our access and infrastructure.
  • /images/c1-perspectives.png

    SOC2 and Least Privilege Access Control

    ·
    Alex Bovee
    Least privilege access control has become the guiding principle for granting ass for SOC 2 compliance, but it can seem daunting to tackle this challenge with so much gray area. Learn how can you practically implement least privilege access controls.
  • /images/when-threat-models-collide.png

    When Threat Models Collide

    ·
    Paul Querna
    Insider and outsider threats are starting to look the same - hackers are stealing identities or logged in sessions. Our approach to a solution? A pragmatic least privilege maturity curve.
  • /images/c1-perspectives.png

    ChatGPT and How AI will Impact Security

    ·
    Alex Bovee
    Thoughts on ChatGPT, AI, and the long ranging security impacts - especially to phishing and social engineering based attacks.
/images/newsletter-3.png

Stay in touch

The best way to keep up with identity security tips, guides, and industry best practices.