Identity Game Show at Black Hat
  • /images/checking-the-box-1.jpg

    Beyond Checking the Box: How to Use UARs for Real Security

    ·
    Marcus Whitaker
    Most companies treat user access reviews (UARs) as a compliance checkbox, but that’s a missed opportunity. This blog explores how leading security teams use UARs to reduce risk, eliminate unused access, and enforce policies more effectively, with real-world examples you can implement today.
  • /images/kevin-blogpost.jpg

    Identity Governance vs. SaaS Management Solutions

    ·
    Kevin Paige
    Many teams confuse SaaS management tools with identity governance platforms, but they solve entirely different problems. Learn why SMPs can’t secure your business and what it really takes to manage access risk.
  • /images/baton.jpg

    Managing Identity for SQL-Powered Apps: No APIs Necessary

    ·
    Justin Gallardo
    Discover how Baton-SQL helps organizations integrate legacy and homegrown applications into their identity governance programs, no APIs or custom code required. Learn how our open-source connector enables fast, scalable access to identity and access data directly from any SQL database.
  • /images/how-we-built-guardrails-into-our-ai-agents-thumbnail.jpg

    How ConductorOne Built Guardrails Into Our AI Agents

    ·
    Paul Querna
    Go behind the scenes of how we built guardrails into Thomas, ConductorOne’s AI agent—and the industry’s first multi-agent identity security platform. This blog breaks down our architecture, trust models, and sandboxing techniques that ensure agents can automate identity governance safely, securely, and transparently.
  • /images/key-takeaways-from-the-2025-identity-security-outlook-report-1.jpg

    The State of Agentic AI in Identity Security

    ·
    Claire McKenna
    Security leaders aren’t just experimenting with AI—they’re rapidly integrating agentic AI into high-stakes workflows like identity provisioning and network defense. ConductorOne’s 2025 Identity Security Outlook Report reveals that urgency is driving adoption, but with thoughtful strategies and real concern for risk.
  • /images/2025-3rd-ai-id-problem.jpg

    The AI Identity Problem

    ·
    Paul Querna
    AI agents are changing the identity landscape, but legacy IAM systems weren’t built for them. These fast-moving, ephemeral identities require dynamic access, machine-speed decisions, and a new model of governance. In this post, we break down the AI identity problem—and what it takes to solve it.
  • /images/2025-ai-wave-1.jpg

    The Divergent AI Landscape: Making Sense of Agentic AI

    ·
    Paul Querna
    Explore the evolving world of agentic AI. Learn the three core types of AI agents—company, employee, and agent-to-agent—and the identity, security, and governance challenges they introduce.
  • /images/2025-death-of-saas.jpg

    Is Enterprise SaaS Dying?

    ·
    Alex Bovee
    AI won’t kill enterprise SaaS—but it will force it to evolve. Learn why the real value in SaaS lies beyond code, and how platformization, expertise, and agentic AI will separate the winners from the rest.
  • /images/2025-ai-wave.jpg

    The Inevitable AI Wave: Modeling the AI Agent Explosion

    ·
    Paul Querna
    AI agents are set to outnumber humans 25 to 1—and this blog breaks down what that means for identity and access management. Drawing from the evolution of servers to serverless, learn how companies must rethink their approach now or risk being overwhelmed by an imminent surge of short-lived, high-density AI identities.
1 2 3 4 Next