Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing Keeper's Bidirectional One-Time Share

Keeper's upgraded One-Time Share solution enables two-way sharing between Keeper users and non-users, providing a secure way of exchanging confidential information and files. This new sharing technology builds upon the functionality of our existing One-Time Share feature. These shares are protected in transit by Keeper's elliptic-curve and AES-256 cryptography and can only be decrypted locally on the recipient's device.

Inside Today's Cyber Attacks: What We Can Learn from Ransomware Groups Like Scattered Spider

Cyber attackers like Scattered Spider are bypassing firewalls—using stolen credentials and social engineering to walk right in! Learn how these new threats exploit trust, target your help desk, and turn your processes against you. Discover why identity is now the new perimeter and what IT leaders must do to protect their organisations.

The unopinionated AI advantage: Building AI-powered SecOps on your terms

After years of hype, hesitation, and false starts, the age of AI in cybersecurity is finally here, and it is moving fast. Security teams are no longer wondering if they should be using AI, but how to harness it without getting trapped by vendor lock-in or rigid solutions that can't adapt to their needs. In this webinar, LimaCharlie founders Maxime Lamothe-Brassard (CEO) and Christopher Luft (CCO) reveal how we are integrating AI into cybersecurity using the same principles that define everything we build: massively scalable, unopinionated, and flexible by design.

Malicious Connectors Potentially Impact Hundreds of Millions of Microsoft 365 Users

Most Microsoft 365 users aren’t aware of this recently growing serious email threat vector. I have been teaching about the risks of Microsoft email rules, forms and connectors on email clients and servers for decades. Both can be created by an attacker learning your email address and logon credentials (e.g., password or MFA codes).

Why Omdia recommends Extended Access Management to secure agentic AI

Omdia, a global analyst and advisory leader, recently released a report called “How Extended Access Management (XAM) closes the gaps in security.” In it, they describe how existing tools have failed to address the most serious security challenges: application sprawl, device sprawl, and identity sprawl.

AI Use Cases for the SOC: How Generative AI Transforms Security Operations

Today’s security operations centers (SOCs) are under more pressure than ever. The number of alerts is growing. Threats are more complex. And security teams are expected to detect, investigate, and respond to incidents faster, all while grappling with talent shortages and limited resources. Generative AI is emerging as a critical enabler in this environment.