Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Privileged Access Management Supports a Zero-Trust Strategy

Privileged Access Management (PAM) fits into a zero-trust strategy by strictly controlling access and monitoring privileged accounts, aligning with the zero-trust principle that users and devices should not be trusted by default. PAM ensures that privileged access is granted based on the principle of least privilege, continuous authentication and ongoing monitoring and auditing, reducing the risk of unauthorized access or privilege escalation.

MDM alone can't meet your compliance goals

This blog has been adapted from a section of 1Password’s ebook: “Why MDM isn’t enough for device security”. To read the complete ebook, click here. For years, global regulations and compliance standards have been a primary driver of Mobile Device Management’s (MDM) adoption in the workplace. This is thanks to its ability to force managed devices, en-masse, into meeting basic levels of compliance.

Passwords, a necessary evil: Are We Ready for a Passwordless World?

Performance reviews, insurance, root canals, speed bumps, and income taxes are but a few things we might consider life’s “necessary evils.” Let me add another one to the list: passwords! For decades, PINs and passwords have been the backbone of online security, but let’s face it, they’re almost always cumbersome, annoying, and far from perfect.

Cybersecurity Essentials for Startups

Launching a startup is an exciting venture. From conducting market research to defining your value proposition and developing a solid business plan, laying the groundwork for your business requires careful planning and diligence. Another key factor to consider is funding. Whether through investors, crowdfunding, or alternative financing options like private loans, securing adequate capital is essential for success.

Password reuse is rampant: nearly half of observed user logins are compromised

Accessing private content online, whether it's checking email or streaming your favorite show, almost always starts with a “login” step. Beneath this everyday task lies a widespread human mistake we still have not resolved: password reuse. Many users recycle passwords across multiple services, creating a ripple effect of risk when their credentials are leaked.

Random but Memorable - Episode 14.4: Security Audit App Ideas with Jacob DePriest

What’s it like to work as a CISO at a security company? This week, 1Password’s VP of Security and CISO, Jacob DePriest, reveals all. Jacob also shares his advice for building strong security teams with diverse perspectives, backgrounds, and skillsets. In Watchtower Weekly, we unpack a novel technique to break into businesses - pretending to offer audits of the company's cybersecurity. Plus, Matt & Roo share their best app ideas in Alternative Security Questions.

MDM vs Device Trust: Balancing security with productivity

Security tools inherently introduce some friction into workflows. However, too much friction can impede employee productivity to such a degree that the broader organization suffers. Historically, this has created a dilemma for CISOs, who struggle with finding the right balance between security and productivity.