Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Password Management

Random but Memorable - Episode 10.5: Ban Cloud Fan Fiction with Stu Hirst from Trustpilot

Will TikTok be banned in the US? How much of a security risk is ChatGPT? We debate all that and more in Watchtower Weekly. Plus, we're joined by Stu Hirst, Chief Information Security Officer at Trustpilot. Tune in, as we discuss common cloud security banana-skins and the challenges facing CISOs in 2023.

Types of Phishing Attacks

There are several types of phishing cyberattacks such as smishing, whaling and spear phishing. It’s important to understand the different types of phishing attacks there are so you’re able to spot them. Knowing the different types of phishing attacks can make all the difference in keeping your information protected. Continue reading to learn more about the different types of phishing attacks and how you can keep yourself safe from them.

Shielding Critical Infrastructure: Conquering Ransomware with Keeper Security Government Cloud

The Biden Administration’s 35-page National Cybersecurity Strategy released in March 2023 emphasizes the growing importance of cybersecurity for both private companies and federal agencies. The strategy specifically highlights ransomware as a significant concern, particularly in terms of its impact on private companies that collaborate with the federal government or are critical to national security.

What's New at Keeper Security - March 2023

Keeper continues to release new features for consumers, businesses, enterprises and managed service providers. Our latest release includes significant enhancements such as a Business Support Portal for our business customers, multiple vault integration capabilities for Keeper Connection Manager (KCM), a Google Cloud integration with Keeper Secrets Manager (KSM), CAC/PIV integration for agencies and more.

Hello CISO - Episode 11 - Part 1: Hiring Top Tier Security Professionals

Hiring can be more art than science. What should you look for when hiring security professionals? How important are degrees and certifications, really? In this episode, Troy breaks down how to spot the brightest talent. Hello CISO is a collaboration between Troy Hunt and the people who build the world's most trusted enterprise password manager.

What is a Privacy Policy?

A privacy policy is a statement that companies have on their website that informs users about the collection, processing, protection and use of their private data. Users are often prompted to review and accept privacy policies, but many of them don’t read through these policies because they don’t think it’s necessary. It’s important to read through these policies to know what information is being collected and how it’s being used.

Keeper Announces Automated Password Rotation - Coming Soon

Regular rotation of passwords, keys and privileged credentials is a critical best practice that greatly reduces an organization’s risk of falling victim to cyberattacks. By limiting the lifespan of a password, organizations can reduce the amount of time during which a compromised password may be valid. Password, key and credential rotation – a feature of Privileged Access Management (PAM) – enables organizations to reset privileged credentials on an automated schedule.

Keeper - The Only Enterprise Password Manager to Use Elliptic Curve Cryptography

Keeper’s Enterprise Password Manager is the only solution that uses Elliptic Curve Cryptography (ECC) in its encryption, making it the most secure password management solution available. ECC is a public-key cryptography method based on the mathematics of elliptic curves. First proposed in 1985, it recently rose to prominence with modern cryptography as it provides a higher level of security compared to traditional encryption methods, such as RSA.