Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Insider Threat Prevention: 5 Steps To Improving Defensive Posture By The End Of 2021

As businesses emerge from a pandemic year, cybersecurity concerns are necessarily top of mind . Companies face expansive cybersecurity threats on many fronts, prompting 75 percent of business leaders to view cybersecurity as integral to their organization’s COVID-19 recovery. They undoubtedly face an uphill battle. Surging ransomware attacks and increasingly deceptive phishing scams are attracting national attention, while more than 500,000 cybersecurity jobs remain unfilled in the US alone.

NIST vs SOC 2: What's the Difference?

When the subject is cybersecurity compliance, the National Institute of Standards and Technology (NIST) is often the first reference that comes to mind. NIST has been around for decades, and its standards for the development of cybersecurity risk management programs are considered the gold standard. There is, however, another standard that applies to service providers that handle customer data, as well as to those firms’ business partners: the SOC 2 audit.

How to Secure Your Supply Chain

We've talked about supply chain security before but it's a trend that doesn't appear to be going away - indeed, the number of attacks on service providers only seems to be increasing. Outsourcing is always a strategic risk for any business, but knowing that these attacks are getting more prevalent, what do you need to be doing to make sure your supply chain in secure? We talk about what needs considering to ensure your data isn't compromised by third party security issues. (Start at 7 mins 33 secs to skip to the 'how to').

Malware alert: The RedXOR and Mamba attacks and how to defend against them

Picture this: It’s a normal day of working from home as usual since the COVID-19 outbreak. After that satisfying cup of coffee, you log in. But something is wrong. No matter how many times you click, your files don’t open. Your screen is frozen and refuses to budge. And then, you see one of the worst nightmares any IT admin can imagine: “Oops, your files have been encrypted. But don’t worry, we haven’t deleted them yet.

Company Trends Report: Visibility into Cyber Risk Management

Everyone tracks progress. Whether it’s academics, health, or job skills, people need visibility into where they started and how well they’re advancing toward a goal. From a business perspective, tracking progress gives insight into whether the organization is prioritizing activities for long-term initiatives or whether it needs to take corrective action. Sometimes, the progress reports remain internal. Other times, organizations share them with customers and business partners.

Improved third party security with rapid assessment tools

The CISO of a large state agency shared with me the automated tools he used to mine intelligence about his IT suppliers, and their sub-suppliers and interconnections by way of vetting for security posture. He truly recognized the threat of third parties long before the SolarWinds hack. His due diligence sparked inspiration for this blog. Can a business assume that third party security controls are strong enough to protect their digital supply chains? What about cloud-based assets?

The Next Chapter

Welcome to the next chapter of 1Password. Today we’re announcing a new investment round in 1Password. Our current investor Accel led this round and a number of incredible folks including Ashton Kutcher’s Sound Ventures and top executives from Shopify, Slack, Squarespace, Google, Eventbrite, MessageBird and Atlassian also came on board. Find out more about how we’re building the future of online security on the 1Password blog.

Investing in our future (again!)

I have some fantastic news to share. Today we’re announcing a new investment round in 1Password. Our current investor Accel led this round and a number of incredible folks including Ashton Kutcher’s Sound Ventures and top executives from Shopify, Slack, Squarespace, Google, Eventbrite, MessageBird and Atlassian also came on board.