Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

PCI DSS 4.0: How to Delight the Auditors

While we all know the actual point of PCI is vastly more far-reaching, we can’t deny that the juggernaut of PCI DSS 4.0 compliance is getting past the auditors. However, there is a right way to do it that doesn’t just check the box – it creates the underlying business operations that enable you to pass an audit any day, at any time, with just the processes you have in hand. Here’s how.

How Large is Your Target? Advice for the Smallest Businesses

Most cybersecurity professionals will often try to cybersplain the importance of protection to their friends. In most social circles, many of the businesses that people work in are small businesses. Perhaps you are the owner of a small delicatessen, a dry cleaner, or you run a yoga studio, or some similar individually owned operation.

How To Complete a Cybersecurity Investigation Faster

Despite implementing cybersecurity administrative and technical risk mitigation control, companies still experience cybersecurity incidents and data breaches. Not every security incident ends with data exfiltration. An organization that can contain the attacker early in the kill chain can prevent data loss and reduce the incident’s impact.

What's TTP? Tactics, Techniques & Procedures Explained

The term Tactics, Techniques and Procedures (TTP) describes the behavior of a threat actor and a structured framework for executing a cyberattack. The actors can range from hacktivists and hobbyist hackers to autonomous cybercriminals, underground rings and state-sponsored adversaries. By understanding the Tactics, Techniques and Procedures involved in a cyberattack kill chain, businesses can discover, evaluate and respond to security threats with a proactive approach. Let’s take a look.

What Is the Safest Way To Send Sensitive Documents?

Sending sensitive information over the internet is often necessary, despite the risks. You may need to send copies of your passport to validate your employment status at a new job, or you might need to send tax forms with your social security number to your accountant. How can you send this information without making it vulnerable to cybercriminals? Using a software platform that uses zero-knowledge encryption is the most secure way to share sensitive information and files.

Attack Vector vs Attack Surface vs Attack Path (Interaction & Differences)

Cybersecurity is an intricate, multidimensional game of defense that requires businesses to stay one step ahead of threat actors. Among the several dimensions to consider, understanding the differences between attack vectors, attack surfaces, and attack paths is paramount. In this blog post, we aim to elucidate the concepts of attack vector, attack surface, and attack path, and how information security professionals can help secure their digital terrain more effectively.

Random but Memorable - Episode 10.9: Artificial Intelligence Mega Mixtape

In this episode we're bringing you a very special AI Edition of Watchtower Weekly. Tune in as we explain why all the headlines about AI cracking passwords are actually old news. And how AI is making pop fans’ fantasies come true. 🤖🔤🎶 We're also joined by Anna Pobletts for This Week at 1Password, where we unveil “Passage by 1Password” and two exciting new products: Passkey Complete and Passkey Flex. Settle in to find out what these solutions mean for passkeys and the passwordless future.

Harnessing Intelligence Powered Cybersecurity in the Cloud

As businesses increasingly embrace cloud computing to enhance their operations, the need for robust cybersecurity measures becomes paramount. Traditional cybersecurity approaches often fall short in protecting cloud environments against ever-evolving cyber threats. This is why today we are excited to announce that we are expanding our CleanINTERNET® service to the cloud.