Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

It's time to rethink how we market and sell security products

With changing technology, evolving security threats, and the vast number of vendors out there, companies intent on successfully selling their products need new approaches. At the end of the day, it isn’t about convincing someone to buy your product whether they need it or not, but ensuring that your product is the right fit for them and that it will solve their problems—some of which they probably don’t realize they have.

How to Identify and Prevent the Top Software Vulnerabilities in 2023?

Software is an intricate part of our lives, with its presence in nearly every device and aspect of technology. However, the software can also be vulnerable to malicious threats, given that the code within it can contain flaws. As a result, software vulnerability has been on the rise over the years and is likely to continue increasing in 2023. Organizations and businesses alike need to remain proactive about their security measures when it comes to their systems, software, and data management.

Let's explore Shell Plugins with 1Password's Engineering team

Join 1Password’s Developer Tools team as we demonstrate Shell Plugins, the feature that enables one-touch authentication to a CLI with biometrics. In this Community Office Hour replay, we demonstrate Shell Plugins, show how to build a plugin and answer questions from the developer community who joined us live. Our panel includes Principal Evangelist Jason Harris, Software Engineer Amanda Crawley and Engineering Lead Simon Barendse.

Building a Safer Learning Environment for K-12 Schools

Cyberattacks targeting our educational institutions impact all of society. They may force schools to close and parents to take time off work for days or weeks at a time. But more insidiously, they cause further disruption to learning, which has already been severely impacted by the pandemic. That means children fail to achieve their potential, which can impact lifetime earnings and gross domestic product (GDP).

OpenSSH Pre-Auth Double Free CVE-2023-25136 - Writeup and Proof-of-Concept

OpenSSH’s newly released version 9.2p1 contains a fix for a double-free vulnerability. Given the severe potential impact of the vulnerability on OpenSSH servers (DoS/RCE) and its high popularity in the industry, this security fix prompted the JFrog Security Research team to investigate the vulnerability. This blog post provides details on the vulnerability, who is affected, and a proof-of-concept to trigger it causing a Denial of Service (DoS).

How To Do Unit Testing In Java

Unit testing is a crucial aspect of software development and helps to ensure that individual units of code are working as intended. In Java, the most popular framework for unit testing is JUnit. In this article, we will go over the basics of how to write and run unit tests in Java using the popular testing framework, as well as some best practices for unit testing.

Top 5 Inadvertent Mistakes of Privileged Users and How to Prevent Them

Your organization most likely has privileged users — employees, subcontractors, and even customers who are authorized to access critical applications and sensitive data. But those elevated access rights make an organization vulnerable. If a privileged user makes a mistake or an attacker gets access to a privileged account, your most valuable data is at risk.