Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is Adaptive Authentication and How Does it Work?

Security no longer works the way it used to. Relying on passwords alone is no longer enough to protect modern systems. Credentials are easily stolen, reused, or compromised, while users are increasingly frustrated with repeated login prompts and complex authentication steps. At the same time, access patterns have changed. Employees work remotely, applications run in the cloud, and users log in from different devices and locations throughout the day.

Introducing SaaS Configuration in Keeper

SaaS sprawl means more credentials, more exposure and more manual work for IT teams. Every cloud service an organization adds is another set of passwords that needs to be created, managed and eventually rotated, and most teams are still doing that by hand. SaaS Configuration gives organizations a scalable way to automate password rotation across any number of Privileged Access Management (PAM) User records in the Keeper Vault, keeping credentials current without the manual overhead.

DDoS Protection for SaaS: Keeping Multi-Tenant Platforms Online

SaaS companies face a 20% yearly likelihood of a significant DDoS attack, according to the Indusface State of Application Security H1 2025, underlining the risks to uninterrupted operations. Even brief downtime can have severe consequences. On average, a DDoS attack costs businesses$6,130 per minute in downtime losses. For SaaS platforms, one attack hits every tenant at once, multiplying the SLA breaches, churn risk, and reputational damage across the entire customer base simultaneously.

Kroll Conversations: Meet the Digital Identity Experts

Enabling seamless user access without compromising security is a complex challenge. Gaurav Sheth, Cynthia Yang and Sorabh Chopra are helping to change that. As part of Kroll’s recently established team dedicated to Digital Identity, their focus is on transforming fragmented administration, manual processes and siloed identity solutions into mature programs.

The 10 Best Enterprise AI Data Loss Prevention Tools

AI usage is invisible to most security tools. Network monitoring sees HTTPS traffic. Endpoint detection sees browser activity. CASB platforms see cloud application access. None of them sees what employees type into AI prompts or upload to AI services through web forms. This invisibility creates a problem. Organizations can’t prove they didn’t expose customer data through AI because they can’t see the data that employees shared.

Device Trust MCP Server: Natural language queries for your entire fleet

Today we're releasing the 1Password Device Trust MCP Server, an open-source server that connects your Device Trust data directly to the AI tools your team already uses, like Claude or ChatGPT. It's available now for all customers on Device Trust Connect.

DSPM Buyer's Guide: 7 Criteria for Evaluating DSPM Tools

Most data security posture management (DSPM) evaluations start with a deceptively simple question: where does our sensitive data live? There are many tools that answer that question. However, the number of tools that go further by tracking how data moves, enforcing controls when data leaves controlled environments, and closing the gap between visibility and action are far more limited.