Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The identity transformation: Analyst and CIO insights

For security and IT professionals, the past decade has brought a series of tectonic shifts that have toppled old assumptions and created new opportunities. First, the SaaS revolution destroyed the paradigm of an IT-governed corporate network. Next, COVID-19 forever altered how and where work gets done. Then, the biggest shockwave of them all arrived: AI-based tools that are rewriting the very definition of “identity.”

How 1Password secures agent architectures

Since 1Password began, we have built security into the places where work actually happens. Security is not treated as an overlay or a separate workflow, we build directly into the browser, command lines, developer tools, and IDEs, where decisions are made and actions take place. We believe that if you want to improve security outcomes, you build where the work happens, making the secure path the simplest one.

1Password becomes the first global partner to transact through Express Private Offers in AWS Marketplace

1Password has achieved a significant milestone in our collaboration with Amazon Web Services (AWS): We are officially the first partner globally to successfully transact through express private offers on AWS Marketplace, a new AI-driven capability that automates personalized pricing, allowing teams to bypass manual negotiations and receive a tailored quote in minutes.

Expanding programmatic access to 1Password

The era of secrets living in fixed systems and accessed through a handful of workflows is long gone. Modern development is faster, more automated, and increasingly AI-assisted. Developers need access to secrets everywhere their code runs – across CI/CD pipelines, local environments, and AI-driven workflows.

Secure your secrets at runtime with the 1Password CLI and Environments

Stop storing secrets in.env files. In this video, we show you how to use 1Password Environments to securely inject environment variables at runtime without storing plaintext on disk. You'll see how the same 1Password Environment powers: 1Password Environments provide secure, read-only access to environment variables across development and production workflows. Key benefits: No plaintext secrets on disk Least-privilege access controls Secure runtime injection Works with CLI, SDKs, and service accounts Reliable automation across macOS and Linux.

Secure your desktop apps with 1Password SDKs

Bring secure, human-in-the-loop authentication directly into your desktop applications. In this video, we introduce desktop authentication support in the updated 1Password SDKs. Your desktop tools and local scripts can now securely access vault items using the native 1Password prompts users already trust. Unlike service accounts, this approach supports human-in-the-loop workflows. Users stay inside your application while explicitly approving access to their secrets.

Security Comprehension and Awareness Measure (SCAM) Demo

What happens when a state-of-the-art AI assistant can read your email, browse the web, and fill in your passwords — but can’t reliably tell a scam from the real thing? In this video, you’ll see real examples of frontier AI agents: These aren’t edge cases. This is the result of 1Password’s new benchmark: SCAM — Security Comprehension & Awareness Measure.

1Password's new benchmark teaches AI agents how not to get scammed

As we embed AI agents into our lives and workflows, we’re learning the (sometimes surprising) ways in which they outperform human beings, and other ways in which they fall short. And occasionally, we find an example where agents, paradoxically, are both better and worse than their human users.

Streamlining SaaS onboarding and offboarding

Onboarding and offboarding are two of the most important and frustrating jobs IT owns. When onboarding works, new hires are productive on day one. When offboarding is done correctly, access is removed cleanly, data remains protected, and audits are much less painful. When either breaks down, the consequences appear quickly: lost productivity, security gaps, wasted spend, and hours of manual cleanup.

AI Principles in Practice: Auditability in non-negotiable

When AI acts on your behalf, auditability is non-negotiable. In the latest Principles in Practice video, Anand Srinivas, 1Password VP of Product & AI, explains why every AI agent action involving credentials must leave a clear audit trail: Who approved the access and why When and where were credentials used What did the agent access and when Did access end when the task was completed Without auditability, AI usage can break trust between employees, security teams, customers, and regulators.

How to build secure agent swarms that power production-grade autonomous systems

If one autonomous agent is useful, it is natural to ask whether many agents working together could be dramatically more effective. Over the last few weeks, the AI community has been testing this idea in practice by running large numbers of agents in coordinated swarms. The early results are clear: swarms can be far more capable than individual agents, but only under the right conditions.

How to build secure agent swarms that power autonomous systems in production

We worked with the Autonomy team to show how 1Password can secure agent swarms using a safer pattern: just-in-time, least-privilege access, without inheriting broad device, cloud, or infrastructure permissions, and without hardcoding secrets into agents.

Solving the unsanctioned SaaS problem

Unsanctioned SaaS and shadow IT are problems every organization deals with. When procuring a new SaaS tool is a few clicks, an email, and a credit card away, it’s never been easier for unsanctioned apps to increase across the business. Often, this is outside IT’s line of sight, outside security controls, and outside standard provisioning/deprovisioning processes.

1Password and 60 Day Hustle: cybersecurity for small businesses

Small businesses can’t afford to wait when it comes to securing their business. Still, cybersecurity can be complex, and any entrepreneur will tell you that there’s already a lot to keep track of when starting and running a company. For small businesses dealing with limited (or nonexistent) IT and security teams, it’s important that their cybersecurity tools are both simple to use and efficient.