Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Comprehension and Awareness Measure (SCAM) Demo

What happens when a state-of-the-art AI assistant can read your email, browse the web, and fill in your passwords — but can’t reliably tell a scam from the real thing? In this video, you’ll see real examples of frontier AI agents: These aren’t edge cases. This is the result of 1Password’s new benchmark: SCAM — Security Comprehension & Awareness Measure.

1Password's new benchmark teaches AI agents how not to get scammed

As we embed AI agents into our lives and workflows, we’re learning the (sometimes surprising) ways in which they outperform human beings, and other ways in which they fall short. And occasionally, we find an example where agents, paradoxically, are both better and worse than their human users.

Streamlining SaaS onboarding and offboarding

Onboarding and offboarding are two of the most important and frustrating jobs IT owns. When onboarding works, new hires are productive on day one. When offboarding is done correctly, access is removed cleanly, data remains protected, and audits are much less painful. When either breaks down, the consequences appear quickly: lost productivity, security gaps, wasted spend, and hours of manual cleanup.

AI Principles in Practice: Auditability in non-negotiable

When AI acts on your behalf, auditability is non-negotiable. In the latest Principles in Practice video, Anand Srinivas, 1Password VP of Product & AI, explains why every AI agent action involving credentials must leave a clear audit trail: Who approved the access and why When and where were credentials used What did the agent access and when Did access end when the task was completed Without auditability, AI usage can break trust between employees, security teams, customers, and regulators.

How to build secure agent swarms that power production-grade autonomous systems

If one autonomous agent is useful, it is natural to ask whether many agents working together could be dramatically more effective. Over the last few weeks, the AI community has been testing this idea in practice by running large numbers of agents in coordinated swarms. The early results are clear: swarms can be far more capable than individual agents, but only under the right conditions.

How to build secure agent swarms that power autonomous systems in production

We worked with the Autonomy team to show how 1Password can secure agent swarms using a safer pattern: just-in-time, least-privilege access, without inheriting broad device, cloud, or infrastructure permissions, and without hardcoding secrets into agents.

Solving the unsanctioned SaaS problem

Unsanctioned SaaS and shadow IT are problems every organization deals with. When procuring a new SaaS tool is a few clicks, an email, and a credit card away, it’s never been easier for unsanctioned apps to increase across the business. Often, this is outside IT’s line of sight, outside security controls, and outside standard provisioning/deprovisioning processes.

1Password and 60 Day Hustle: cybersecurity for small businesses

Small businesses can’t afford to wait when it comes to securing their business. Still, cybersecurity can be complex, and any entrepreneur will tell you that there’s already a lot to keep track of when starting and running a company. For small businesses dealing with limited (or nonexistent) IT and security teams, it’s important that their cybersecurity tools are both simple to use and efficient.