SECURITY
XAM
Can VDI secure BYOD?
In 2006, Joanna Rutkowska stepped on stage at the Black Hat Conference and demonstrated a hack she called the ‘Blue Pill.’
Continue readingIn 2006, Joanna Rutkowska stepped on stage at the Black Hat Conference and demonstrated a hack she called the ‘Blue Pill.’
Continue readingFew ad campaigns have ever had such a long-lasting impact as the iconic ‘I’m a Mac/I’m a PC’ commercials that ran in the mid-aughts.
Continue readingIn May, we announced the availability of 1Password software development kits (SDKs) in beta. Those SDKs – available as open-source libraries for Javascript, Python, and Go – are now production-ready.
Continue readingWith remote work, bring-your-own-device, and shadow IT apps becoming commonplace, the number of unsanctioned apps and untrusted devices is rapidly climbing. And cybersecurity and IT leaders have been stuck with tools that only secured access to some applications, some devices, and some people, creating an Access-Trust Gap.
Continue readingThe thing about nostalgia is that it conveniently omits all the past’s imperfections.
Continue readingWhen you tell people you’re writing a piece on cybersecurity insurance, they tend to look at you with a mix of confusion and pity.
Continue reading