Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Secure Sharing in Keeper Works

Secure sharing in Keeper works by encrypting records with record-level encryption keys, enforcing granular permissions and giving administrators centralized policy control and audit visibility into how sensitive credentials, passkeys and privileged resources are accessed. Keeper’s zero-knowledge architecture ensures that only authorized users can decrypt shared data, while flexible sharing options support everything from everyday collaboration to enterprise-grade Privileged Access Management (PAM).

RSA 2026: Leading the way to secure agentic AI

Every year, security and tech leaders come to the RSA conference in San Francisco to take the industry’s pulse, and every RSAC tends to be dominated by a single, overarching theme. Last year, the theme was: “AI agents are coming, and governance isn’t ready.” And sure enough, the theme of RSAC 2026 was: “AI agents are here, and governance needs to catch up.”

1Password debuts Unified Access at RSA Conference 2026

At RSA 2026, 1Password unveils Unified Access — a new agentic security platform built for the age of AI. As AI agents transform how we work, companies face a new challenge: how to move fast without losing control of credentials, secrets, and access. Unified Access helps teams discover, secure, and audit everything—across both humans and AI agents. In this video: The future of work is agent-driven. The future of security needs to be, too.

How 1Password is building a culture of AI fluency through AI champions

If 2025 was the year of AI adoption, 2026 is when AI evolves from a software story to a people story. Katya Laviolette, our Chief People Officer, explored this idea in a recent Forbes article about how 1Password’s internal network of AI Champions is shaping this evolution and helping us set the standard for how we use AI to drive impact across 1Password.

How To Protect Patient Data From Phishing Attacks

According to HIPAA Journal, phishing remains one of the most common and effective attack methods used against healthcare organizations and is a leading cause of healthcare data breaches. As healthcare becomes more digital, cybercriminals increasingly target clinicians and administrative staff to access Electronic Health Records (EHRs) and other Protected Health Information (PHI).

How to Manage Identity Sprawl in the Age of AI Agents and NHIs

Non-human identities (NHIs) and AI Agents including service accounts, CI/CD credentials and cloud workload identities, now eclipse human identities in enterprise identity systems by 50:1 to 100:1. Modern identity security platforms must assign identities to these assets and furthermore, apply roles, access control policies, visibility and governance in order to secure the modern enterprise.

Five Small Steps to Prevent Your Data From Being Put at Risk

This Digital Cleanup Day, take control of the clutter that could be putting your data at risk. Old accounts, reused passwords, unsecured files and other bad cyber habits create easy entry points for cybercriminals – and most people don’t realize how exposed they are until it's too late.