Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2024

How I Use a Password Manager as a College Student

Since starting my internship at Keeper Security, I’ve had the opportunity to enter into the world of cybersecurity, particularly surrounding the role of password management. This eye-opening experience has not only educated me on the dangers of an unprotected online presence, but it’s also encouraged me to follow cybersecurity best practices in my personal and academic life.

How to Securely Share Your WiFi Password With Airbnb Guests

You can securely share your WiFi password with Airbnb guests by using a password manager. A password manager is an online solution that lets you create, store, protect and share login information for apps and online accounts. Password managers keep your information safe by storing it in an encrypted, digital vault. As an Airbnb host, you should use a password manager like Keeper because you can securely share your WiFi password for a limited time with each of your Airbnb guests.

Utilizing Zenity's Security Suite to Detect and Mitigate AI Vulnerabilities in Real-Time

AI has completely changed how we live, work and play. With its unparalleled efficiency, ongoing learning abilities and its detailed precision, it makes short work out of what used to be more complex and cumbersome tasks. Although AI systems are incredibly powerful and only growing in capacity and scale, they’re not without their challenges. Like other types of programs and infrastructures, AI is not immune to vulnerabilities and security issues.

Preventing Data Breaches in User-Developed AI Applications on Low-Code Platforms

As more and more companies adopt low-code platforms and launch AI applications, the need for proper data security has never been greater. While it’s true that low-code platforms give users the freedom to develop powerful AI solutions with minimal programming knowledge or experience, this same level of flexibility also inadvertently exposes applications to potential data breaches.

Tackling Technical Debt in Cybersecurity: A Veteran's Guide

Let’s talk technical debt. It’s that silent, creeping problem many of us have faced—those quick fixes and shortcuts we took to keep things running smoothly. They accumulate over time, leaving us with a tangled web of outdated systems and patchwork solutions. In cybersecurity, this isn’t just a minor annoyance—it’s a ticking time bomb. So, what’s technical debt consolidation?

High-Fidelity Alerts: The Key to Effective API Security

APIs are essential for modern applications as they enable seamless communication and data exchange, serving as the foundation of these applications. However, their interconnected nature makes them vulnerable to various threats. The high volume of API calls - ranging from millions to billions every month - poses a challenge in distinguishing between genuine attacks and harmless irregularities.