Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why protecting 1Password with a passkey is just as secure as a password and Secret Key

Account password. Secret Key. These two pieces of information have been the backbone of 1Password’s security model for years. The Secret Key in particular is what makes 1Password fundamentally different to other password managers, and why you can be confident that your data is always safe, even if someone breached our servers.

How Okta empowers devs to find & fix security issues with Snyk

Many organizations find it challenging to locate and fix the vulnerabilities in their containers. But the team at Okta knew that securing the containers that support Auth0 (their identity and access (management platform), was imperative. The team also knew these security processes had to be developer-friendly: making finding and fixing container vulnerabilities as simple as possible.

Splunk Security Use Cases

A top challenge faced by security practitioners is double-edged: you’re trying to keep up with new and increasing cyberattacks — all while investigating and remediating existing threats. As we know all too well, time is of the essence when you’re investigating threats and determining the scope and root-cause of a potential breach. On top of that pressure, you’re likely short on resources and experienced personnel, limiting your ability to conduct thorough investigations.

Key Threat Hunting Deliverables with PEAK

When most people think of threat hunting, they think of uncovering unknown threats. Would you believe me if I told you that is only ONE of many (better) reasons to show value with threat hunting? The PEAK Threat Hunting Framework incorporates three distinct hunt types: hypothesis-driven, baseline and model-assisted threat hunts. Each hunt type follows a three-stage process: Prepare, Execute, and Act.

How Trustwave Uses Enterprise Penetration Testing to Fortify a Client's Defensive Posture

Anyone who has played a Tower Defense-style game, (Plants Vs. Zombies being a favourite) knows the only way to hold off the hoard of brain-eating zombies is to know your weaknesses before the next wave attacks and to plan accordingly. Oddly, preparing a cybersecurity defense is somewhat similar: the player/organization knows attacks are coming, they have an idea from where and how they will be conducted, and they need to place the proper pieces on the board at the right place to stay safe.

Use KnowBe4's New Callback Phishing Feature to Boost Your Organization's Security Awareness

Callback phishing isn't your typical email scam. Instead of the usual suspects with bad grammar and obvious malicious links, these attacks play mind games. They set up a multi-layered trap using some smooth-talking tactics to get you to dial a fake number and spill your sensitive info.

5 Best Web Application Penetration Testing Tools Of 2023

A Web Application is a software program that runs on a server and enables users to interact with the application over the internet. It allows users to perform tasks such as creating accounts, logging in, accessing data, managing content, and more. Web applications are designed to be dynamic and user-friendly while providing secure access to information or services.

Top Questions Keeper Received at BlackHat 2023

The Keeper team had an amazing time at the 2023 Black Hat security conference in Las Vegas. We met with partners, prospects, friends, vendors, and of course, our incredible customers. Over the span of two days we talked to thousands of people and collected valuable data on a number of critical topics. In fact, we generated a mountain of data about what cybersecurity professionals want from password and privileged access management solutions.

The Windows Restart Manager: How It Works and How It Can Be Hijacked, Part 1

Malware utilizes a multitude of techniques to avoid detection, and threat actors are continuously uncovering and exploiting new methods of attack. One of the less common techniques includes the exploitation of the Windows Restart Manager. To stay ahead of malicious authors, it is important to be aware of them and understand how they work.

What Role Does Procurement Play in Supply Chain Risk Management?

Thanks to globalization and rapidly developing technology, enterprise involves more connections than ever before, and more connections means more risk in the supply chain. Supply chain risk extends past those suppliers with whom you’re doing business directly. Beyond your third-party suppliers are their suppliers, and the supply chain continues branching out from there. In today's connected world, organizations must not isolate their supply chain risk management.