Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Password Management

Random but Memorable - Episode 8.9: Historically Bad Musical Movie

Today we're joined by 1Password's Director of Security, Adam Caudill (and an unexpected rooster 🐓), to give us a 1Password Basics primer on credential stuffing and how 1Password works to keep you safe online. We also can't peel our eyes away from the recent security news in Watchtower Weekly, but hey, it might get us access to the most prestigious eye-tracking apps – like MoviePass. To top it all off we have a musical-themed round of Ridiculous Requirements, including bonus points for theatrically singing. 🎭

Webcam security in the age of Zoom

The trusty webcam used to be a “nice to have” for the occasional job interview, virtual hangout, or simple YouTube recording. But that all changed when the pandemic started. In just a few months it became a daily tool for people around the world, from fully remote businesses to families and friends kept apart in lockdown.

Do you really need to change your password every 90 days?

You power on your computer and open your inbox, ready for another day at work. But instead of some unread emails, you see a login screen with an all-too-familiar message: it’s time to update your password. And it can’t just be any password. It needs to be one you haven’t used before, and it must include a number… and a special character… and be 8 characters long…

Hello CISO - Episode 3 (Part 2): Shadow IT and Working from Home

In part one of this episode of Hello CISO, Troy explored why regaining some of the control and visibility lost to shadow IT requires a mindset shift. In part two, he delves into where that mindset shift might lead us. Hello CISO is a new series aimed at Chief Information Security Officers, IT security teams, and all other members of an organization responsible for maintaining the safety and integrity of the business and its operations.

Small Talk: putting data privacy at the forefront with your customers

Conversations about consumer data privacy grow louder each year, with the news headlines to match. Trust in the technology sector is now at an all-time low and customers are increasingly concerned about the privacy of their personal information. It’s become a serious topic that all business owners need to follow, not just security specialists and tech bloggers.

Secure yourself with our digital declutter checklist

A digital declutter helps you organize your life and has the added bonus of reducing your vulnerability to common threats. But knowing where to begin can be hard – most of us leave a larger digital footprint than we realize. We’ve created a checklist to help you clear away the clutter and reap the rewards of a clean digital state.

Random but Memorable - Episode 8.8: Secret Agency Space Nerds with Jason Meller from Kolide

Find out how a researcher uncovered a secret German intelligence agency using an Apple AirTag, and how Ozzy Osbourne's (yes, you read that right) NFT project turned into a scam – all in this episode’s Watchtower Weekly. We also invite Kolide CEO and founder, Jason Meller, to discuss user-first endpoint management, empowering the end-user, and creating a culture of security. Plus, Anna gets revenge in Ridiculous Requirements: Capital City edition! 🏙

Hello CISO - Episode 3 Part 1: Shadow IT and Working from Home

The migration from the office to WFH exposed a growing security threat that’s been on IT’s radar for years: shadow IT. With more and more workers using apps and services outside the purview of IT, a new way of thinking has emerged to confront the new reality. In part one of this episode of Hello CISO, Troy explains why shadow IT is here to stay, and why the loss of control that it brings isn’t the end of the world.

Hacking 101: What is social engineering?

For the average person, “traditional hacking” isn’t really an ever-present threat. It’s unlikely that a hacker will ever try to track you down, steal one of your devices, and bypass whatever you’ve set up to protect your personal data. Social engineering, on the other hand, is an increasingly common security threat that you’ve probably encountered many, many times before.