Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing Keeper's Discovery Rules Engine

Modern IT environments span on-premises, hybrid and multi-cloud infrastructure, and every new asset added needs to be discovered, evaluated and brought under access control. Discovery tools can surface those resources, but without automation, processing them is slow, inconsistent and prone to error. Critical assets get missed, and security gaps open.

Keeper Endpoint Privilege Manager earns "Good" rating from connect professional

Keeper Security has once again been recognized by the German technology publication connect professional. In its latest independent test, Keeper Endpoint Privilege Manager (EPM) received a “good” (GUT) rating, highlighting the platform’s strong capabilities for securing and managing endpoint privileges.

AI builders can now easily access 1Password secrets management and developer tools

AI coding tools have changed who builds software. The barrier to entry has dropped to the point where a designer, an analyst, or a first-time founder can turn an idea into a working app in an afternoon. That shift is real, and it's accelerating.

Device Trust MCP Server: Natural language queries for your entire fleet

Today we're releasing the 1Password Device Trust MCP Server, an open-source server that connects your Device Trust data directly to the AI tools your team already uses, like Claude or ChatGPT. It's available now for all customers on Device Trust Connect.

Introducing SaaS Configuration in Keeper

SaaS sprawl means more credentials, more exposure and more manual work for IT teams. Every cloud service an organization adds is another set of passwords that needs to be created, managed and eventually rotated, and most teams are still doing that by hand. SaaS Configuration gives organizations a scalable way to automate password rotation across any number of Privileged Access Management (PAM) User records in the Keeper Vault, keeping credentials current without the manual overhead.

Shadow IT vs Shadow AI: What's the Difference?

Imagine a customer service representative at your organization uploads sensitive customer data into an AI tool to draft emails more quickly. When an employee uses an AI tool without IT approval, it is known as shadow AI, and such scenarios are becoming increasingly common. Among employees who use AI at work, 78% report using tools that have not been formally approved by their organization, according to Microsoft’s 2024 Work Trend Index.

1Password shows 370% YoY growth in Okta research report

1Password has never been more popular in the workplace. Okta’s 2026 “Businesses at Work” report reveals that, of the 8,000+ apps that Okta analyzed, “The security tool 1Password showed the highest industry-level growth, notching a 370% YoY increase in the technology sector.”

The costs of unmanaged credential sprawl

In Ancient Rome, the military had a daily “watchword” that soldiers used to enter the camp. An official would inscribe the watchword on clay tablets, which were distributed throughout the various military units. If a tablet wasn’t returned, they swiftly tracked it down and punished the soldier who had failed to return it.

World Password Day 2026: Treat Identity as the Perimeter (and Act Like It)

World Password Day is no longer just a nudge to pick stronger passwords, it’s a moment to rethink identity. Attackers rarely “hack” systems today; they log in as you. Combine expert guidance on phishing, MFA, password managers, behavioral defenses, and new threats from AI and quantum computing to better secure your accounts now and for the future.