Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Random but Memorable - Episode 12.8: The RSA Special

It's our RSA special! Join the podcast gang and 1Password's Chief Product Officer, Steve Won, as we unpack everything that went down at 2024's RSA Conference. Hear all about 1Password's game changing RSA announcement and the reaction, plus we share what the team got up to – straight from the conference floor! Don't worry, just because it's the RSA Special doesn't mean we didn't have time to play a round of Security Blank! But this time with a narcissistic twist...

Two new checks for the ChatGPT macOS app

With the recent announcement of OpenAI’s ChatGPT desktop application for macOS, users gain access to LLM workflows outside of their browser. ChatGPT’s broad adoption by employees across industries, and around the world, has put employers, compliance, and security teams into high gear as they seek to balance the gains made in productivity with the potential risks of how these tools are being used.

The Best VPN Alternative for Businesses

Virtual Private Networks (VPNs) are used by businesses to secure remote access to systems and encrypt employees’ internet traffic. However, while VPNs add some level of protection for distributed workforces, they aren’t enough to keep your business and employees safe from common cyber threats since they make internal tracking of users complex, lack adequate protection and don’t scale in a remote work environment.

Security Question and Answer Best Practices

When you create an account, you may be prompted to set up a security question for authentication. Security questions add a layer of security alongside your login credentials. Following best practices for security questions involves using different questions for different accounts, avoiding self-written questions, using multiple security questions and updating security questions and answers regularly.

How Do Cybercriminals Gather Personal Information About Their Targets?

Cybercriminals gather personal information about their targets by using social engineering techniques, looking at social media accounts and collecting data that gets leaked from public data breaches. The more personal information a cybercriminal can collect about their target, the easier it is for them to launch cyber attacks that their targets will easily fall for. Continue reading to learn more about how cybercriminals gather their target’s personal information and how you can keep your data safe.

How Should Sensitive Information Be Stored?

When we think about storing sensitive information, two types of information come to mind: digital data and physical data. While physical data can be securely stored in a physical vault, digital data should be stored in an encrypted cloud storage solution to protect it from common cyber threats. Continue reading to learn the best ways to store your sensitive physical and digital information, plus the storage methods to avoid.