Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Phishing Failures: How Not to Phish Your Users

This blog was co-written by Javvad Malik and Erich Kron. Let’s dive into the cautionary world of phishing simulations gone wrong. You know, those attempts to train users not to fall for phishing that somehow end up setting off more alarms than a Hawaiian missile alert system. Let's explore why we need to phish our users, but more importantly, how not to phish them. We turn to two of our trusted security awareness advocates Javvad Malik (JM) and Erich Kron (EK) to shed some light on the matter.

How New College Graduates Can Avoid Increasingly Personalized Job Scams

For many fresh out of college, the drive to land that first professional role is a top priority. Yet, new graduates can be exposed to sophisticated scams that can jeopardize not just their finances but also their identities. Imagine receiving an email that mentions your former school dean or a professor, claiming they've personally recommended you for a fantastic job opportunity.

Keeper Security Forges Cybersecurity Partnership With Williams Racing

Keeper is excited to announce a new multi-year partnership with Williams Racing, uniting two organizations driven by innovation, cutting-edge technology, excellence and high-speed performance. In a sport where milliseconds can determine victory, protecting sensitive data is paramount. Williams Racing understands this necessity, making the partnership with Keeper Security a natural fit.

The Benefits of Using Keeper as Your Password Manager

Using Keeper Password Manager can prevent you from getting hacked. It also secures your most important data and takes the pain away from remembering multiple passwords. Continue reading to learn more about Keeper Password Manager and the benefits it offers for personal and business use.

Preventing Magecart Attacks Through Supply Chain Vulnerabilities

The digital supply chain refers to the chain of third-party digital tools, services and infrastructure that is depended on for a particular first-party service (such as your website or SaaS platform). In an ever-changing digital landscape, supply chains can be brittle with many unseen risks. The nature of supply chain risk is transitive; any part of the often long and complicated digital supply chain can be compromised, causing all components downstream of it to also be compromised.

Secure and Compliant CI/CD Pipelines with GitLab

In today’s fast-paced software development world, seamless, secure, and compliant CI/CD pipelines are critical for success. However, managing multiple tools and processes across development teams using traditional CI/CD solutions can lead to security vulnerabilities, compliance roadblocks, and hinder overall software delivery.

Defending Against Supply Chain Spoofing in Critical Manufacturing

Supply chain attacks are a serious and growing threat to businesses across all industries. However, these attacks pose an even greater risk for manufacturers in critical infrastructure sectors. One pernicious form of supply chain attack is spoofing, where attackers impersonate legitimate suppliers to sneak malicious code or components into products. Research shows that 2023 had the highest number (2769 in the US alone) of entities affected by supply chain spoofing.