Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Password Management

What's New With Keeper | December 2023

This month we have a number of new feature enhancements and product updates to share with you, including Dark Mode for Android, thoughtful setting enhancements across the Keeper vault and browser extension, as well as improvements to our AWS CLI credential process with Keeper’s Secrets Manager (KSM). Continue reading to learn more.

How To Run a Penetration Test

You can run a penetration test by following the five stages: preparation, reconnaissance, penetration, reporting and remediation. Penetration tests are important to help protect an organization from security breaches and data leaks. Cybercriminals are always looking for vulnerabilities within an organization’s system to steal their sensitive data. Penetration testing helps organizations identify security vulnerabilities to help prevent security breaches.

How To Protect an Enterprise Database From Privilege Abuse

Organizations can protect their enterprise database from privilege abuse by implementing the Principle of Least Privilege (PoLP), following a zero-trust security approach and investing in a Privileged Access Management (PAM) solution. Continue reading to learn what privilege abuse is, the risks of privilege abuse in an organization and how to prevent it.

How Does a PAM Solution Help Organizations Meet CIP Cyber Security Standards?

The North American Electric Reliability Corporation’s Critical Infrastructure Protection (NERC CIP) standards are a comprehensive set of requirements that ensure the security and reliability of the North American power grid. These standards address both the physical security and cybersecurity of the bulk electric system, mandating measures to protect critical assets from potential threats.

What Is Ransomware as a Service?

Ransomware as a Service (RaaS) is a business model in which cybercriminals develop and sell ransomware to buyers known as affiliates who use it to execute ransomware attacks. Ransomware is a type of malware that prevents users from accessing their data or devices by encrypting them and locking users out until a ransom is paid. Typically, cybercriminals need to know some coding to develop and execute ransomware attacks.

Random but Memorable - The Festive Quiz Special ft. Jack Rhysider and Carole Theriault

It's our final episode of the year! We’ve pulled together a panel of special guests for the fun and festive Security Quiz of the Year - 2023 edition. 🎄📝🎅 Podcasting royalty, Jack Rhysider from Darknet Diaries and Carole Theriault from Smashing Security, join the panel to help us unpack another year in cybersecurity. Bring on the belly-laughs! 🤣 We also crown the ultimate winner of HackerNoHacker in the grand finale, and unveil our brand new game for 2024: Security Blank. 🥳👑

What Are Dark Web Scans?

Dark web scans, also known as data breach scans, are scans that let you know if your personal information, such as your email and login credentials, is on the dark web. There are several free and paid dark web scans available online to use and each of them works differently. Continue reading to learn what the dark web is, how dark web scans work and how to initiate a dark web scan.