Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Closing the credential risk gap for AI agents using a browser

AI agents increasingly are completing real tasks in the browser, acting on behalf of employees, and connecting to the same systems humans rely on to get work done. This introduces a new security problem: AI agents require credentials – passwords, API keys, and one-time codes – to operate. As agents proliferate, the risk surface increases and it brings a variety of identity and access management challenges.

Microsoft and Dropbox password managers are sunsetting: What it means and what to do next

Your password manager might be closing up shop, putting your digital security at risk. In recent months, two major tech players – Dropbox and Microsoft – have discontinued their built-in password manager features. If you’ve been relying on Microsoft Authenticator or Dropbox Password, it’s now time to decide how you’ll protect your accounts going forward.

1Password announces new integration with Zscaler

A new integration between 1Password Device Trust and Zscaler marks the first step in helping our shared customers implement Zero Trust practices. 1Password is proud to announce a new integration with Zscaler, a leading cloud-based solution for Zero Trust network access (ZTNA). This marks a shared commitment to helping our customers secure access, reduce their attack surface, manage AI app sprawl, and practice the principles of Zero Trust.

What security leaders need to know about mergers and acquisitions

For security teams, the stakes are rarely as high as they are during mergers and acquisitions (M&A). Suddenly, you’re tasked with managing two companies' worth of devices, applications, identities, and data. There can be serious issues lurking within the newly acquired (or soon-to-be-acquired) company, including legacy systems, poorly vetted third-party contractors, and incompatible security policies.

Clickjacking: What it means for 1Password users

This blog details how 1Password has addressed clickjacking in the latest version of our browser extension (version 8.11.7). We have no indication that this class of vulnerability directly puts 1Password’s systems at risk. Clickjacking is a technique where a malicious or compromised webpage visually disguises or overlays elements of a page or browser extension, like the autofill menu, so that a user unintentionally clicks on them.

Do any CISOs feel lucky?

There are two enormous cybersecurity events each year in the United States: RSA Conference and the week in Vegas that is so full of conferences, summits, and ancillary events that it’s simply known as “Hacker Summer Camp.” From Security BSides Las Vegas to Black Hat and DEF CON, it takes the fortitude of a camel to survive the desert heat and the late nights.

How to lead with confidence in the AI era: a conversation with Nancy Wang, VP, Engineering

Artificial Intelligence (AI) is reshaping how we work and lead. At 1Password, we see AI as a powerful accelerator that helps our teams focus on the work that matters most. To explore what it means to lead in this new era, we sat down with Nancy Wang, VP/Head of Engineering. Nancy shares how AI shows up in her day-to-day, how she inspires her team to be curious, and why human skills like trust matter more than ever.

New Device Trust Check makes browser extension enforcement easier

Your identity and access management solutions only work if your users comply with the policies you set. Even with the right controls in place, enforcement can break down when users – intentionally or not – find ways around them. That’s why, as we continue to develop Extended Access Management (XAM), we’re focused on embedding enforcement more deeply into everyday workflows across 1Password’s suite of solutions.

Now available on Pax8 Marketplace: 1Password Enterprise Password Manager - MSP Edition

Managed service providers (MSPs) can simplify client security and grow profits with 1Password, now available on Pax8 Marketplace. For MSPs to grow their businesses, they typically need to meet three overlapping goals: Achieving these goals is challenging, especially in a world where both MSPs and their clients must reckon with identity sprawl, SaaS sprawl, and unsanctioned access.