Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is Enterprise Identity Management?

By 2025, non-human identities (like service accounts, API keys, and bots) will outnumber human identities by 45:1 in cloud environments. Yet many organizations still rely on static IAM roles and manual provisioning, leaving them exposed to credential sprawl, insider risk, and compliance violations. That’s where modern Enterprise Identity Management (EIM) comes in. Enterprise software development is increasingly cloud native.

Symmetric Cryptography in Practice: A Developer's Guide to Key Management

Symmetric cryptography powers everything from HTTPS to JWT tokens, but key management remains a significant challenge. This developer guide covers three critical use cases—session keys, self-use keys, and pre-shared keys—with practical strategies for secure generation, rotation, and storage.

Introducing Keeper's Bidirectional One-Time Share

Keeper's upgraded One-Time Share solution enables two-way sharing between Keeper users and non-users, providing a secure way of exchanging confidential information and files. This new sharing technology builds upon the functionality of our existing One-Time Share feature. These shares are protected in transit by Keeper's elliptic-curve and AES-256 cryptography and can only be decrypted locally on the recipient's device.

Inside Today's Cyber Attacks: What We Can Learn from Ransomware Groups Like Scattered Spider

Cyber attackers like Scattered Spider are bypassing firewalls—using stolen credentials and social engineering to walk right in! Learn how these new threats exploit trust, target your help desk, and turn your processes against you. Discover why identity is now the new perimeter and what IT leaders must do to protect their organisations.

The unopinionated AI advantage: Building AI-powered SecOps on your terms

After years of hype, hesitation, and false starts, the age of AI in cybersecurity is finally here, and it is moving fast. Security teams are no longer wondering if they should be using AI, but how to harness it without getting trapped by vendor lock-in or rigid solutions that can't adapt to their needs. In this webinar, LimaCharlie founders Maxime Lamothe-Brassard (CEO) and Christopher Luft (CCO) reveal how we are integrating AI into cybersecurity using the same principles that define everything we build: massively scalable, unopinionated, and flexible by design.

Malicious Connectors Potentially Impact Hundreds of Millions of Microsoft 365 Users

Most Microsoft 365 users aren’t aware of this recently growing serious email threat vector. I have been teaching about the risks of Microsoft email rules, forms and connectors on email clients and servers for decades. Both can be created by an attacker learning your email address and logon credentials (e.g., password or MFA codes).