Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Password Management

Six Ways To Prevent Privilege Escalation Attacks

Organizations need to prevent privilege escalation attacks to protect their sensitive data from unauthorized access. To prevent privilege escalation attacks, organizations should implement least privilege access, follow password security best practices, enforce Multi-Factor Authentication (MFA), keep software up to date, monitor network traffic and regularly run penetration tests.

How to Install Keeper Commander CLI

Keeper Commander is a command-line and SDK interface to Keeper® Password Manager. Commander can be used to access and control your Keeper vault, perform administrative functions (such as end-user onboarding and data import/export), run reports and create custom automations. Keeper Commander is an open source project with contributions from Keeper's engineering team and partners. Keeper recommends installing Commander using the binary installation. On the Commander Github page, the current commander build is always available via the releases link.

Keeper 101 - How to Autofill Passwords and Forms With KeeperFill

Introduction KeeperFill is Keeper’s powerful, autofilling feature that works across all devices, allowing you to automatically and securely enter your usernames, passwords, passkeys, 2FA codes and more. I KeeperFill is available for every web browser including: Chrome, Firefox, Safari, Edge, Opera, Brave and any other Chromium-based browser.

Keeper 101 - How to Change Passwords Using Keeper

Long, randomly generated passwords that are created for each of your account logins help protect you from cybertheft and account takeover. This video will review KeeperFill’s password change feature using the password generator, which makes the process of changing high-risk passwords easy and secure. To begin, be sure you’ve installed our KeeperFill Browser Extension.

Keeper for Teams and Small Business 3 Minute Demo

Keeper eliminates the pain of having to remember passwords while protecting your business from password-related data breaches and cyberthreats. This video will demonstrate all that Keeper has to offer your small business and provide you with step-by-step instructions to get your team up and running in no time. If you're looking for an Enterprise demo with SSO and advanced capabilities, make sure to check out Keeper Enterprise.

How To Create a Positive Digital Footprint

Your digital footprint is the trail of data you leave behind online. It’s important to have a positive digital footprint to maintain your relationships, help you in all your personal and professional endeavors, and keep cybercriminals at bay. To create a positive digital footprint, you need to remove any negative posts, post positive content, think before you post, and interact with others with respect and kindness.

A guide to developer secrets and shadow IT for security teams

This is the final post in a series about shadow IT. In this series, we’ve detailed how and why teams use unapproved apps and devices, and cybersecurity approaches for securely managing it. For a complete overview of the topics discussed in this series, download Managing the unmanageable: How shadow IT exists across every team – and how to wrangle it.

How to Transfer a Keeper Account

Learn how to transfer a Keeper Account in less than 2 minutes with our step-by-step guide. When an employee leaves the organization, an administrator with the proper permissions can transfer a user's vault to another user. Account Transfer is an optional feature that should be configured during the initial deployment phase of the Keeper rollout. A successful transfer requires that the users have logged in at least once prior to the transfer action.

DevOps Security Challenges and Best Practices

Some of the challenges when adopting DevOps security, also known as DevSecOps, are placing too much focus on tools rather than processes, cultural resistance, weak access controls and poor secrets management. While implementing DevOps security comes with its challenges, there are several best practices organizations can follow to make its implementation as effective and seamless as possible, including proper change management, combating secrets sprawl and following the principle of least privilege.