Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WatchGuard Signs The Climate Pledge, Commits to Net Zero by 2040

As a cybersecurity company, we spend every day thinking about how to protect the world from threats. As a global organization, WatchGuard has the power ‒ and the responsibility ‒ to step up and help fight the threat of unchecked climate change. That’s why we have signed The Climate Pledge and are deepening our commitment to environmental sustainability.

The Rise of Insider Threats

Imagine a scenario where an employee receives an email from a colleague, asking for login credentials to a valuable application within their organization. The recipient, perhaps busy with other tasks or not fully paying attention, quickly replies with the needed credentials. However, the sender was not actually a colleague, but a threat actor posing as a colleague. As a result, the now-compromised credentials enable the threat actor to launch a subsequent attack on the organization.

Broken Cyber Windows Theory

Have you ever walked down a street with broken windows, burnt out cars, graffiti and felt a bit uneasy? There's a reason for that, and it's not just about aesthetics. The Broken Windows Theory, introduced by social scientists James Q. Wilson and George L. Kelling in 1982, suggests that visible signs of crime and antisocial behavior encourage further crime and disorder. But what does this have to do with cybersecurity? More than you might think.

Threat Actors Are Increasingly Abusing AI Tools to Help With Scams

Cybercriminals are increasingly using AI tools to assist in malicious activities, according to Microsoft’s latest Cyber Signals report. “AI has started to lower the technical bar for fraud and cybercrime actors looking for their own productivity tools, making it easier and cheaper to generate believable content for cyberattacks at an increasingly rapid rate,” the report says.

Drata and 1Password unite to deliver secure, continuous compliance

Compliance without access control is incomplete. Security without continuous compliance is inadequate. With 1Password Extended Access Management and Drata, companies can finally unify these efforts—closing the Access-Trust Gap while accelerating audit readiness, improving security posture, and building trust overall. “Security and compliance are inseparable, especially as SaaS sprawl and AI adoption introduce new layers of complexity and risk,” says David Faugno, Co-CEO of 1Password.

Innovation in Extended Access Management: AI and productivity are changing how we approach cybersecurity

It’s been a year since we announced 1Password Extended Access Management, and in that time, it’s become clearer than ever that we are facing a major shift in how workers use technology to drive productivity. Whether it’s through organizations embracing the use of AI agents or tech-savvy employees independently seeking out any tool or application they need, the way we work has fundamentally evolved. And cybersecurity must evolve with it.

Supercharge your workflow: Use 1Password service accounts and SDKs to secure agentic AI access

AI agents are evolving fast — from helpful assistants to autonomous actors that can browse the web, analyze data, resolve customer service issues, assist in generating code, book travel, and more. As these agents take on more responsibilities, it’s crucial that the security model around them keeps up.

Identifying Threats is Great. Sharing That Info is Even Better

In the current climate, we are tackling the challenge of raising awareness at an industry level, highlighting the advantages of threat intelligence sharing: a practical and collaborative way to enhance cybersecurity awareness across industries and gain a tactical advantage in the evolving threat landscape.

KubeCon Europe 2025: Why Identity is the New Backbone of Secure Infrastructure

The standout themes at KubeCon + CloudNativeCon Europe 2025 in London strongly centered on how identity is rapidly becoming the linchpin for securing cloud-native infrastructure. The recurring theme I saw wasn’t just Kubernetes innovation—it was the rising urgency of securing the who behind every action across platforms, clusters, services, and tools.