Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How the Right ESP Can Cut Costs, Reduce Risk & Get You CMMC Audit-Ready Faster

Navigating the Cybersecurity Maturity Model Certification (CMMC) framework can feel overwhelming, especially for government contractors working to secure and retain Department of Defense (DoD) contracts. Between implementing the 110 rigorous security requirements in NIST 800-171 and maintaining ongoing compliance, the path forward can feel like a maze of complexity and cost. But there’s a smarter way through it.

WatchGuard Signs The Climate Pledge, Commits to Net Zero by 2040

As a cybersecurity company, we spend every day thinking about how to protect the world from threats. As a global organization, WatchGuard has the power ‒ and the responsibility ‒ to step up and help fight the threat of unchecked climate change. That’s why we have signed The Climate Pledge and are deepening our commitment to environmental sustainability.

The Rise of Insider Threats

Imagine a scenario where an employee receives an email from a colleague, asking for login credentials to a valuable application within their organization. The recipient, perhaps busy with other tasks or not fully paying attention, quickly replies with the needed credentials. However, the sender was not actually a colleague, but a threat actor posing as a colleague. As a result, the now-compromised credentials enable the threat actor to launch a subsequent attack on the organization.

Torq HyperSOC is the first Autonomous SOC Platform with Native Model-Context Protocol (MCP) Support

Innovation in cybersecurity technology, particularly in security operations, is advancing at an incredible pace. The past few months have seen a surge in announcements of Agentic AI solutions and SOC Analyst AI Agents, transforming the landscape rapidly. At BlackHat USA 2023, Torq pioneered this space by introducing Socrates, the first AI Agent SOC Analyst. This highlights the remarkable acceleration of AI adoption in cybersecurity and the significant advancements made in a relatively short period.

Broken Cyber Windows Theory

Have you ever walked down a street with broken windows, burnt out cars, graffiti and felt a bit uneasy? There's a reason for that, and it's not just about aesthetics. The Broken Windows Theory, introduced by social scientists James Q. Wilson and George L. Kelling in 1982, suggests that visible signs of crime and antisocial behavior encourage further crime and disorder. But what does this have to do with cybersecurity? More than you might think.

Threat Actors Are Increasingly Abusing AI Tools to Help With Scams

Cybercriminals are increasingly using AI tools to assist in malicious activities, according to Microsoft’s latest Cyber Signals report. “AI has started to lower the technical bar for fraud and cybercrime actors looking for their own productivity tools, making it easier and cheaper to generate believable content for cyberattacks at an increasingly rapid rate,” the report says.

Drata and 1Password unite to deliver secure, continuous compliance

Compliance without access control is incomplete. Security without continuous compliance is inadequate. With 1Password Extended Access Management and Drata, companies can finally unify these efforts—closing the Access-Trust Gap while accelerating audit readiness, improving security posture, and building trust overall. “Security and compliance are inseparable, especially as SaaS sprawl and AI adoption introduce new layers of complexity and risk,” says David Faugno, Co-CEO of 1Password.

Innovation in Extended Access Management: AI and productivity are changing how we approach cybersecurity

It’s been a year since we announced 1Password Extended Access Management, and in that time, it’s become clearer than ever that we are facing a major shift in how workers use technology to drive productivity. Whether it’s through organizations embracing the use of AI agents or tech-savvy employees independently seeking out any tool or application they need, the way we work has fundamentally evolved. And cybersecurity must evolve with it.

Supercharge your workflow: Use 1Password service accounts and SDKs to secure agentic AI access

AI agents are evolving fast — from helpful assistants to autonomous actors that can browse the web, analyze data, resolve customer service issues, assist in generating code, book travel, and more. As these agents take on more responsibilities, it’s crucial that the security model around them keeps up.