In this demo, see how you can use 1Password Connect to securely access your 1Password items and vaults in your company's applications and cloud infrastructure using a private REST API.
In this demo, see how you can use 1Password Service Accounts to automate secrets management in your applications and cloud infrastructure. Service accounts are ideal for shared environments because they provide an authentication method that isn't associated with an individual.
In this demo, see how you can integrate 1Password Connect with Kubernetes Secrets to access API keys, tokens, and other credentials saved in 1Password in your company's applications and cloud infrastructure.
In this demo, see how you can inject 1Password secrets as environment variables into a Kubernetes pod or deployment using either a 1Password Service Account or a 1Password Connect Server to retrieve items.
Microsoft 365 is a prime target for adversaries, with objectives ranging from credential harvesting to ransomware. However, managing detection rules can be a cumbersome task, especially as security analysts try to keep up with the ever-changing landscape of telemetry options from Microsoft.
In the U.S. Federal Government, too often the superset of assets that need to be managed across an entire department or agency aren’t well understood. Many of the latest executive orders, binding operational directives, and even the most recent White House Cybersecurity Strategy all point to a foundational piece of reducing your attack surface: having an accurate inventory of your assets.
PCI DSS 4.0 is coming, and getting your organization up to speed will be no small task. Don't wait until the last minute. Hear Payment Card Industry (PCI) Qualified Security Assessors Brian Dean and Joe Moser as they explain the key differences between PCI 4.0 and PCI 3.2.1, what to expect with the new release, and which steps you need to take right away to prepare.
In this episode of Cyber Security Decoded, Steve Stone, Head of Rubrik Zero Labs, is joined by a former CISO at Johnson & Johnson to discuss the ever-evolving role of the CISO. They discuss what she has learned from the biggest threat intrusions in her career, how the role of the CISO is evolving to adapt to new cyber threats, and what we can tactically do to empower more professionals from different backgrounds to pursue a career in cybersecurity.