Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Attacker's Playbook: A Technical Analysis of Quishing and Encrypted SVG Payloads Used in HR Impersonation Phishing Attacks

In this series, we first explored the psychology that makes HR phishing so effective, then showcased the real-world lures attackers use to trick your employees. Now, we’re going under the hood to answer the critical question: How do these attacks technically bypass security defenses?

How to lead with confidence in the AI era: a conversation with Nancy Wang, VP, Engineering

Artificial Intelligence (AI) is reshaping how we work and lead. At 1Password, we see AI as a powerful accelerator that helps our teams focus on the work that matters most. To explore what it means to lead in this new era, we sat down with Nancy Wang, VP/Head of Engineering. Nancy shares how AI shows up in her day-to-day, how she inspires her team to be curious, and why human skills like trust matter more than ever.

AssumeRoleWithWebIdentity WHAT?! Solving the Github to AWS OIDC InvalidIdentityToken Failure Loop

Ariel Beck has over a decade of software engineer and system architect experience. As current Head of Architecture at Jit.io, Ariel believes in proactively shaping the tech landscape to create secure, scalable solutions. Security experts dedicated to shaping insightful editorial content, guiding developers and organizations toward secure cloud app development. Dive into a wealth of knowledge and experience in fortifying software integrity.

Better Network Visibility with New 11:11 Cloud Console Tools

When it comes to driving directions, it is easy to become dependent on a navigation system, especially when you are in an unfamiliar area. Unfortunately, when you run into one of those pesky locations that still don’t have wireless coverage you can quickly find yourself without much of an idea of where to turn next. Managing network infrastructure shouldn’t feel like navigating in the dark.

What's New in CyCognito: August 2025 Platform Enhancements

Security teams need automation, clarity, and speed to stay ahead. This month’s updates continue to refine the CyCognito experience so you can maintain an accurate asset inventory, pivot through investigations quickly, and share the right information with stakeholders. In the past few weeks we delivered improvements across automation (including Action Rules), APIs improvements, new investigation and management options, and reporting controls for PDFs. Below is a detailed look at what is new.

Why AI Agents and MCP Servers Just Became a CISO's Most Urgent Priority

Over the last year, I’ve spent countless hours with CISOs, CTOs, and security architects talking about a new wave of technology that’s changing the game faster than anything we’ve seen before: Agentic AI and Model Context Protocol (MCP) servers. If you think AI is still in the “cool demos and pilot projects” stage, think again. We’re already seeing autonomous agents reasoning, remembering, and taking actions in live production environments.

Kubernetes 1.34 - Top Security Enhancements

Kubernetes v1.34 is coming soon, and it brings a rich batch of security upgrades – from alpha features that hint at the future of zero-trust Kubernetes, to mature enhancements making their way into stable releases. Whether you’re managing a production cluster or exploring new security patterns, this release has something worth your attention.

How the RevOps team at Tines uses Tines: Automating lead routing, enrichment, and assignment

At Tines, we use our workflow orchestration and AI platform to power our mission-critical processes, and the Revenue Operations team is no exception. In this post, we’ll share how we use Tines to automate a key part of our go-to-market motion: lead management. The workflow we’re sharing powers every inbound lead we receive, whether it comes from a demo request, a webinar sign-up, or a bulk CSV upload from the marketing team.

Is iCloud Keychain Secure?

Apple users have a variety of tools and services integrated into its ecosystem, such as Notes, Pages, Keynote, Reminders, Calendar, Mail, and more. One of these services is iCloud Keychain, an integrated password manager within the Apple product suite to autofill your passwords when logging in to your account, share passwords with family, and sync your details across your Apple devices.

What C-Levels Should Know About Enterprise Cloud Backup

Enterprise cloud backup keeps your business running when disaster strikes. Organizations lose an average of $5,600 per minute during downtime, making reliable data protection non-negotiable for companies running applications across multiple clouds, containers, and virtual environments. Traditional backup methods fail with modern distributed infrastructure; you need enterprise backup strategies that scale with your actual environment, not outdated approaches that worked a decade ago.