Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What cyber conflict reveals about power and doctrine, with Allie Mellen

Cyber conflict is easiest to misread when we treat it as an isolated technical event. In this episode of Chasing Entropy, Dave Lewis speaks with analyst and author Allie Mellen about her book Code War and why the cyber strategies of the United States, China, and Russia make more sense when viewed through the lens of history, doctrine, and political intent.

What we learned using AI agents to refactor a monolith

AI agents are increasingly used to refactor large codebases, but many teams lack a clear understanding of where they succeed and where they fail. At 1Password, we applied agentic tooling to a multi-million-line Go monolith, and in this blog we'll share what worked, what broke, and what it means for teams adopting AI in production systems.

Eliminate organization-wide credential risk

Many critical tools — social platforms, finance apps, and AI tools — can't be put behind SSO, leaving credentials shared over Slack, stored in spreadsheets, and reused across accounts. In this video, we walk through how 1Password extends identity security beyond SSO, giving teams like Marketing and Finance simple, secure access to shared credentials — while IT and Security gain the visibility, control, and auditability they need. Because attackers don't care about org charts, and now, neither do your security controls.

Beyond patching: Building a Mythos-ready security program

When Anthropic revealed the existence of Mythos, the frontier AI model they deemed too dangerous for public release, the security community was alarmed. And it’s not hard to see why: Mythos is capable of detecting software vulnerabilities at a previously unimaginable scale, and autonomously crafting exploits to weaponize these flaws. According to Anthropic, Mythos created 181 exploits of Firefox in testing, ninety times more than the company’s previous model (Claude Opus 4.6).

Natoma and 1Password help enterprises scale AI securely with governed agent access

To support enterprise workflows like monitoring systems, triaging support tickets, and automating routine work, AI agents need access to the same sensitive systems employees use, including databases, APIs, SaaS tools, and internal infrastructure. However, many of these systems still rely on shared passwords, API keys, tokens, and other credential-based access paths that are difficult to manage and control.