Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Chasing passwordless? Omdia's new report recommends Extended Access Management

Omdia, a global analyst and advisory leader, recently released a report called “How Extended Access Management (XAM) closes the gaps in security.” The report outlines the challenges of managing access for the modern workforce and suggests strategies for addressing those challenges. Omdia defines the challenge areas of access management as: In 2024, 1Password launched Extended Access Management (XAM), a new security category designed to close the Access-Trust Gap.

Four new admin features to streamline rollouts, reduce friction, and boost adoption

We’re making it easier for IT and security admins to deploy 1Password Enterprise Password Manager at scale with three powerful new features that improve visibility, reduce onboarding confusion, and lay the groundwork for a more unified experience across our platform. Whether rolling out to your first 50 users or your next 5,000, these updates help you move faster, support your employees, and strengthen access security across your organization.

Where AI meets action: How The Trade Desk enhances security ops with Tines Workbench

While AI represents a fundamental turning point for organizations, many teams are still struggling to realize its full potential. They’re looking for AI to do more, while maintaining crucial security and privacy guardrails. That’s where Tines Workbench comes in, a universal AI copilot. Workbench empowers you to incorporate data from across your stack and take action within a single, secure architecture.

What to Do if You Are Affected by a Retailer Cyberattack

In April and May 2025, several prominent UK retailers including Marks & Spencer (M&S), Co-op, and Harrods experienced significant cyberattacks. At the time of writing we have not had confirmation of these attacks but consider them to be a Ransomware attack. These incidents are disrupting services, compromising customer data, and highlight vulnerabilities in retail cybersecurity. This guide aims to help you as a consumer take the steps you can take to protect yourself.

From Reactive to Ready: Automated Detections and Defense with Devo + Detecteam

Security analysts know the feeling: The all-too-familiar dread creeps in as a new exploit hits the headlines. Cyber teams worldwide brace themselves, knowing that their weekends, vacations, and carefully laid plans are likely about to go up in smoke. The first question a CISO will always ask rings in their ears: “Are we protected against this?”

How Compliance Frameworks Strengthens Security and Trust

For modern digital businesses, compliance isn’t just a legal requirement—it’s a trust-building and security-enabling mechanism. Compliance frameworks like PCI DSS 4, HIPAA, GDPR, and NIST establish the technical and procedural standards organizations must meet to protect sensitive data, avoid regulatory penalties, and qualify for cyber insurance.

Key Management Best Practices to Avoid Cryptographic Failures

The expansion of cloud applications and mobile devices has created unlimited endpoints, leaving data vulnerable to security threats. In fact, Cryptographic failures rank no.2 in OWASP’s top 10 web application security risks. Effective cryptographic key management is crucial to protecting data, as a single compromised key could result in a massive data breach. This blog will explain some of the best practices for cryptographic key management.

Conquering the Chaos of Vulnerability and Exposure Management at RSAC Conference 2025

Recently, industry analyst Jon Oltsik outlined a critical shift underway in cybersecurity: the move toward a threat-informed defense. As Oltsik describes, organizations are beginning to strengthen the intersection of vulnerability scanning and threat intelligence, using AI to bolster asset classification and risk scoring. This evolution is essential as enterprises seek to move beyond fragmented security practices and build a more cohesive exposure management strategy.