Inside DigitalOcean’s SOX Compliance Playbook
  • /images/NIS2.jpg

    The NIS2 Directive: What to Know and What It Means for Identity Security

    ·
    Greg Howard & Brittany Smail
    As of October 2024, all EU member states are required to have laws enforcing the NIS2 Directive, a cybersecurity framework aimed at protecting Europe’s critical infrastructure and services from cyberattack. Learn about NIS2, whether your business needs to comply, and best practices for meeting NIS2’s core identity security requirements.
  • /images/designing-a-great-user-experience.jpg

    Designing a Great User Experience

    ·
    Brittany Smail
    As we continue to add new features and deeper capabilities to ConductorOne, our product designers and software engineers have the challenging task of making the platform even simpler and more intuitive to use. Learn all about their approach to UI design and check out our latest UI updates!
  • /images/2024_Identity-is-a-new-perimeter.jpg

    Identity Is the New Perimeter — Here’s How to Lock It Down

    ·
    Paul Querna
    Thanks to the success of zero trust, attackers are finding it harder to execute traditional breach tactics—so they've shifted their focus to identity. Here are practical steps you can take to shore up your defenses against identity-based attacks.
  • /images/2024_How-frequent-UAR.jpg

    How Often Should You Run User Access Reviews?

    ·
    Brittany Smail
    Regularly reviewing who has access to your critical systems and data is an essential cybersecurity practice, but preparing and running user access reviews can be… daunting. How often should you run reviews to stay secure and compliant? And how can you make them less painful?
  • /images/2024_Light-IGA.jpg

    Light IGA — Is It Right for You?

    ·
    Brittany Smail
    The term “light IGA” loosely categorizes a crop of new solutions that don’t line up neatly with the traditional definition of IGA. This post covers what the term means, the wide range of light IGA tools on offer, and what companies should think about when considering light IGA options.
  • /images/end-user-experience.jpg

    The Importance of the End User Experience

    ·
    Ishaan Banta and Brittany Smail
    Companies that prioritize creating great end user experiences as part of their overall identity security program are seeing both productivity and security gains. Learn about their approach and how to build it into your own strategy.
  • /images/2024_Nist-Blog-Post.jpg

    NIST CSF 2.0: What to Know

    ·
    Ishaan Banta
    In February, the National Institute of Standards and Technology (NIST) released a major update to its cybersecurity framework (CSF), which businesses and government organizations use as guidance for mitigating cyber risks. Read on to learn what's new with NIST CSF 2.0 and how to implement its guidelines.
  • /images/What-is-SSO-tax_horizontal.jpg

    The SSO Tax: What It Is and Why It Sucks

    ·
    Ishaan Banta
    In recent years, software vendors have used the importance of SSO to their advantage, building SSO-implementation fees into their pricing—a practice that’s come to be known as the “SSO Tax," a cause of major frustration for companies of all sizes and budgets.
  • /images/Building-blocks.jpg

    Your Problems Aren't Unique: How to Build a Foundation Against Overprivileged Access in Any Environment

    ·
    Ishaan Banta
    Does overprivileged access keep you up at night? Learn foundational steps for reducing privileges and increasing security that work for every environment, no matter how complex or unique your challenges may seem.
1 2 3 Next