Crawl, Walk, Run: Solving Your Identity Crisis
·Claire McKennaManaging identity security is increasingly complex, with blind spots, over-permissioned users, and the rise of non-human identities. A crawl, walk, run approach helps organizations gain visibility and automate identity governance for stronger security.Some Like It Hot: IGA Hits the Big Time
·Greg HowardThis is an amazing time to be part of the identity landscape. Long ignored, identity is now seen as foundational to security — and companies are catching on, as evidenced by ConductorOne's incredible past year and the success for other identity vendors in the market. Read on to learn why everyone is suddenly embracing identity.Growing Together: A Chat with the Summer Intern C1rew
·Brittany SmailOur engineering interns were integral to one of our biggest product updates this summer. Before moving on to the next steps in their degrees and careers, they chatted with us about working on the project and being part of the C1rew!Top 5 Ways to Clean Up Your Identity and Access
·Marissa EndresMost enterprises are just beginning their IAM hygiene journey, with the initial goal to achieve visibility and clean up glaring access risks. This journey can be challenging, but you can significantly enhance your organization's security posture with incremental IAM improvements.Moving Beyond Zero Trust
·Brittany SmailThe security concept of zero trust has seen wide adoption in the last decade, creating real security gains—and new security challenges. We're now getting signs that zero trust alone won't be enough to combat evolving identity-based breach tactics. What will the post–zero trust era look like?The Growing Threat of AI-Driven Social Engineering
·Alex BoveeSocial engineering is a broad term used to characterize a set of tactics and techniques used to manipulate individuals into divulging confidential information or performing sensitive actions. These attacks have been around for years, but with the emergence of AI, the sophistication and volume of these attacks has only increased. Dive into how generative AI is going to increase the threat of social engineering, and how organizations can protect themselves against it.NYDFS 23 NYCRR 500 and Least Privilege Access
·Alex BoveeEarlier this year, amendments were made to the NYDFS 23 and NYCRR 500. Both changes reflecting a response to the significant growth in cybersecurity threats. Learn more about the these amendments, how they're related to the principle of least privilege, and how organizations can ensure compliance with them.Moving on from Legacy IGA—Why Users Won’t Go Back
·Brittany SmailLegacy IGA solutions have been the norm in the identity space for a long time. However, these solutions are not without issues. Check out this blog post to learn more about the common challenges legacy IGA poses through real world examples.Five Takeaways from the Snowflake Attack
·Alex BoveeBreaches are far from uncommon in the cybersecurity landscape, however, each incident can serve as a learning experience. The recent Snowflake attack serves as a similar scenario. Dive into ConductorOne CEO Alex Bovee's thoughts on how this breach came to happen, what we can learn from it, and the best steps companies can take moving forward to prevent reoccurrences.