Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

All SSO security is not created equally

This blog has been adapted from a section of 1Password’s ebook: Why SSO is not enough for identity security. To read the complete ebook, click here. Single sign-on (SSO) solutions integrate with a company’s identity provider (IdP) to allow users to authenticate to multiple applications via a single log-in. By reducing the number of access points and employee credentials, SSO reduces a company’s attack surface.

How To Know If Your Phone Is Hacked

Our phones store an enormous amount of personal information — messages, photos, banking details and more. But with all that data, they also become prime targets for hackers. Watch this video to learn how to spot the common signs of a hacked phone, what to do if your phone is hacked and how to keep your phone safe from hackers.

1Password's new secrets syncing integration with AWS

A new integration between 1Password and AWS Secrets Manager makes it faster and easier to sync secrets across environments – all from within the 1Password desktop app. This update enables all 1Password and AWS Secrets Manager joint customers to simply and securely deliver secrets to AWS Secrets Manager. It’s the fast, familiar 1Password experience you know and trust – now extended to include environment variables and secrets support.

1Password signs strategic collaboration agreement with AWS: New integration simplifies app and AI secrets management

1Password has signed a strategic collaboration agreement (SCA) with AWS to help modern enterprises close security blind spots, accelerate secure cloud adoption, and manage access in increasingly complex hybrid and AI-driven environments. This collaboration represents a long-term commitment to co-innovation, global growth, and enabling the adoption of AI tools, all while expanding support for the shared customers of 1Password and AWS.

Is PAM Suitable for Small Businesses or Only for Large Enterprises?

Monitoring privileged access is crucial for organizations of all sizes, not just large enterprises. Privileged Access Management (PAM) refers to the security and management of privileged accounts, such as administrators or third-party vendors, that have access to sensitive data and systems. Although PAM is traditionally viewed as a solution for large enterprises, small businesses also benefit significantly from implementing PAM solutions, especially as they expand into hybrid and cloud environments.