Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

The Comprehensive Guide to Enterprise Mobile Security

Mobile devices are an indispensable part of our modern lives. While twenty years ago most people just used their phones to make phone calls, today they serve an ever-growing number of purposes. They still keep us connected, of course, but they also allow us to be more productive anywhere we go. That increase in accessibility is why enterprise mobile security is just as essential as the devices themselves.

Introducing Unlock with Google for 1Password Business

1Password Business customers can now integrate with Google Identity Platform using OpenID Connect (OIDC). Doing so brings all the benefits of integrating 1Password with your IdP: streamlined access, unified security policies, and improved auditing, compliance, and reporting workflows.

Common Types of Network Devices and Their Functions

Modern IT infrastructure is comprised of various interconnected network components that make communication and resource sharing possible throughout your organization. Whether securing sensitive data, facilitating collaboration, or simply ensuring uninterrupted access, a network of devices is at play—and the elements of these devices are critical to a business’s successful operation.

How to tell if your organization's credentials have been involved in a breach

Stolen credentials are the easiest route into your organization for a hacker. Verizon’s 2023 Data Breach Investigation Report found that threat actors used stolen credentials in 49% of attempts to gain unauthorized access to organizations. The problem IT teams face is knowing when credentials have been stolen or leaked in a breach – otherwise you’re waiting to respond to a security issue rather than handling it proactively.

The 11 Best Ways to Prevent an Internet Leak in 2024

Data breaches have increased this year, costing businesses $4.88 million—a 10% increase from 2023 and the highest increase since the pandemic. The cost is due to several factors, but an internet leak is one of the common factors that cost businesses money, causes loss of reputation, and threatens the online privacy of the general public. So, what can you do to help yourself, friends, family, employees, or businesses to limit the costs of a data breach or internet leak?

AI Governance Belongs In Your Organization

In the modern workplace, GenAI models have become powerful assets due to their ability to introduce efficiency, up level product innovation, and expedite how teams close the gap on competitors. However, these powerful tools also introduce significant risks related to data security and governance. Companies that aren’t actively figuring out how to govern the GenAI they’ve adopted will inevitably be left vulnerable.

CISO Strategies Post-CrowdStrike to Safeguard the Balance Sheet

The ubiquitous CrowdStrike incident resulted in a major diversion of resources, with some hard-hit organizations assigning almost all of their IT and security personnel to damage control. As a CISO of an impacted organization, you will likely be required to answer for a lack of resilience to this type of event. To support your decision-making as you reevaluate your resilience budgets, this post outlines four resilience strategies based on key learnings from the CrowdStrike event.

How CISOs Should Handle Future CrowdStrike-type Breaches

SolarWinds, MOVEit, Knight Capital, and now CrowdStrike. The vendor ecosystem will remain a major playing field for operational disruptions. But are you ready for the next inevitable event? As a CISO, your response to such a question from the board shouldn't be anything less than a resounding "Yes!" Here are five plans of action to help your organization survive the next major IT quake, whether it's due to another rusty security update or a third-party breach.