Nailing the Security Audit with RRCU
  • /images/whitepaper-blog-social-3.png

    Why Modern Organizations Need Next Generation IGA Webinar

    ·
    Kate Cheney
    How can you get visibility into all identities, let alone manage the access each user has? Simon Moffat, founder and research analyst at The CyberHut, and Alex Bovee, ConductorOne’s CEO, discuss these challenges facing the modern enterprise and more on this webinar hosted by The CyberHut.
  • /images/copy-of-c1-resource-graphics-21.png

    Inside Scoop with Ramp's Head of Security Assurance

    ·
    Kate Cheney
    Hear the inside scoop on, the Head of Security Assurance at Ramp, Paul Yoo's journey to finding ConductorOne and how the partnership has changed the way Ramp achieves compliance. Learn more about Ramp's journey and hear from Paul himself on how ConductorOne has saved him and his team time and effort on exceeding security goals.
  • /images/copy-of-c1-resource-graphics-11.png

    Reimagining Identity Governance

    ·
    Alex Bovee
    Alex Bovee had the opportunity to speak with Lisa Cook from ISACA to discuss all things identity. Hear the full recording and learn more about their views on modern businesses and bridging the gap between compliance measures and security outcomes.
  • /images/shift-left-on-identity-travis-mcpeak-01.jpg

    Travis McPeak, CEO and Co-Founder of Resourcely, on Shifting DevSecOps Left and Making Developers More Productive

    ·
    Kate Cheney
    The first in our video interview series, Alex Bovee had the opportunity to talk with Travis McPeak about emerging trends in security, compliance, and platform engineering.
  • /images/copy-of-c1-resource-graphics-13.png

    When Attacks Go … Well? Key Takeaways From the Reddit Hack

    ·
    Alex Bovee
    Phishing has become increasingly prevalent, as seen in Reddit's account compromise last week, and standing privileges and sensitive access pose significant risks. We need to shift to zero standing privileges to secure our access and infrastructure.
  • /images/c1-blog-03-tips-2400x1350-v2.png

    Best Practices for More Secure AWS IAM

    ·
    Marissa Endres
    AWS IAM can be unwieldy–setting up permissions is complicated and can leave gaps in security when unnecessary access is granted. Learn how to make AWS IAM more secure with best practices for least privilege access controls.
  • /images/c1-blog-03-tips-2400x1350-v2.png

    Four Common Mistakes to Avoid When Running User Access Reviews

    ·
    Marissa Endres
    The ultimate goal is to review sensitive or high risk access in a timely fashion to lower standing permissions and achieve least privilege, but there are few common mistakes that have setback many companies on that journey.
  • /images/blog-zero-trust-is-winning.png

    What’s Next for Zero Trust?

    ·
    Alex Bovee
    Zero Trust is accepted as a superior technical security architecture for the world outside of the corporate network. So what comes next?
  • /images/shift-left.png

    Why Identity Needs to Shift Left

    ·
    Paul Querna
    “Shifting left” has become a critical mindset to fix problems in modern security practice that have remained unsolved, despite increased governance and visibility.
Previous 1 2