<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://blog.b5dev.com/categories/ai/</loc></url><url><loc>https://blog.b5dev.com/</loc></url><url><loc>https://blog.b5dev.com/closing-the-credential-risk-gap-for-browser-use-ai-agents/</loc></url><url><loc>https://blog.b5dev.com/categories/partners/</loc></url><url><loc>https://blog.b5dev.com/microsoft-and-dropbox-password-managers-are-sunsetting/</loc></url><url><loc>https://blog.b5dev.com/categories/news/</loc></url><url><loc>https://blog.b5dev.com/categories/tips-advice/</loc></url><url><loc>https://blog.b5dev.com/categories/community/</loc></url><url><loc>https://blog.b5dev.com/from-hackathon-nerves-to-internship-wins-kavyas-journey-at-1password/</loc></url><url><loc>https://blog.b5dev.com/categories/life-at-1password/</loc></url><url><loc>https://blog.b5dev.com/1password-now-available-in-comet-the-ai-browser-by-perplexity/</loc></url><url><loc>https://blog.b5dev.com/1password-announces-new-integration-with-zscaler/</loc></url><url><loc>https://blog.b5dev.com/categories/building-1password/</loc></url><url><loc>https://blog.b5dev.com/why-more-women-should-consider-a-career-in-sales/</loc></url><url><loc>https://blog.b5dev.com/categories/compliance/</loc></url><url><loc>https://blog.b5dev.com/categories/security/</loc></url><url><loc>https://blog.b5dev.com/what-security-leaders-need-to-know-about-mergers-and-acquisitions/</loc></url><url><loc>https://blog.b5dev.com/ai-and-security-at-black-hat-5-key-takeaways/</loc></url><url><loc>https://blog.b5dev.com/clickjacking-what-it-means-for-1password-users/</loc></url><url><loc>https://blog.b5dev.com/categories/events/</loc></url><url><loc>https://blog.b5dev.com/categories/securing-1password/</loc></url><url><loc>https://blog.b5dev.com/do-any-cisos-feel-lucky/</loc></url><url><loc>https://blog.b5dev.com/how-to-lead-with-confidence-in-the-ai-era/</loc></url><url><loc>https://blog.b5dev.com/new-device-trust-check-makes-browser-extension-enforcement-easier/</loc></url><url><loc>https://blog.b5dev.com/categories/xam/</loc></url><url><loc>https://blog.b5dev.com/inside-the-culture-powering-1passwords-next-chapter/</loc></url><url><loc>https://blog.b5dev.com/msp-edition-1password-enterprise-password-manager-available-on-pax8-marketplace/</loc></url><url><loc>https://blog.b5dev.com/security-principles-guiding-1passwords-approach-to-ai/</loc></url><url><loc>https://blog.b5dev.com/simplify-access-reviews-with-trelica-by-1password/</loc></url><url><loc>https://blog.b5dev.com/categories/trelica-by-1password/</loc></url><url><loc>https://blog.b5dev.com/why-omdia-recommends-extended-access-management-to-secure-agentic-ai/</loc></url><url><loc>https://blog.b5dev.com/new-research-uncovers-four-security-challenges-caused-by-unmanaged-ai/</loc></url><url><loc>https://blog.b5dev.com/getting-started-students-and-families/</loc></url><url><loc>https://blog.b5dev.com/back-to-school-onboarding-checklist/</loc></url><url><loc>https://blog.b5dev.com/mcp-server-for-trelica-by-1password-now-on-aws-marketplace/</loc></url><url><loc>https://blog.b5dev.com/where-mcp-fits-and-where-it-doesnt/</loc></url><url><loc>https://blog.b5dev.com/customize-your-rollout-speed-up-your-day-new-1password-enterprise-updates/</loc></url><url><loc>https://blog.b5dev.com/a-unified-future-whats-next-for-our-end-user-experience/</loc></url><url><loc>https://blog.b5dev.com/why-omdia-recommends-extended-access-management-to-simplify-compliance/</loc></url><url><loc>https://blog.b5dev.com/omdia-recommends-extended-access-management-for-shadow-it-and-ai/</loc></url><url><loc>https://blog.b5dev.com/celebrating-pride-at-1password-2025/</loc></url><url><loc>https://blog.b5dev.com/what-to-do-16-billion-password-data-leak/</loc></url><url><loc>https://blog.b5dev.com/all-sso-security-is-not-created-equally/</loc></url><url><loc>https://blog.b5dev.com/categories/business/</loc></url><url><loc>https://blog.b5dev.com/1password-signs-strategic-collaboration-agreement-with-aws/</loc></url><url><loc>https://blog.b5dev.com/1password-secrets-syncing-integration-with-aws/</loc></url><url><loc>https://blog.b5dev.com/categories/developers/</loc></url><url><loc>https://blog.b5dev.com/designing-excellence-the-story-behind-a-bespoke-f1-academy-livery/</loc></url><url><loc>https://blog.b5dev.com/how-the-red-bull-racing-pepe-jeans-academy-programme-and-1password-are-driving-female-excellence-on-and-off-the-track/</loc></url><url><loc>https://blog.b5dev.com/sso-cant-secure-every-identity/</loc></url><url><loc>https://blog.b5dev.com/why-omdia-recommends-extended-access-management-for-device-security/</loc></url><url><loc>https://blog.b5dev.com/enforce-device-posture-beyond-sso-with-extended-device-compliance/</loc></url><url><loc>https://blog.b5dev.com/discover-and-secure-shadow-it-with-1password-extended-access-management/</loc></url><url><loc>https://blog.b5dev.com/sso-isnt-complete-solution-for-saas-access-management/</loc></url><url><loc>https://blog.b5dev.com/rsac-2025-recap-with-1password/</loc></url><url><loc>https://blog.b5dev.com/omdia-recommends-extended-access-management-for-passwordless/</loc></url><url><loc>https://blog.b5dev.com/epm-q2-2025-admin-features/</loc></url><url><loc>https://blog.b5dev.com/eliminate-password-risks-and-accelerate-your-journey-to-passwordless-with-1password/</loc></url><url><loc>https://blog.b5dev.com/why-the-future-is-passwordless-but-not-password-free/</loc></url><url><loc>https://blog.b5dev.com/trelica-by-1password-recognized-in-gartner-magic-quadrant/</loc></url><url><loc>https://blog.b5dev.com/secure-developer-credentials/</loc></url><url><loc>https://blog.b5dev.com/how-it-and-security-teams-can-manage-byod/</loc></url><url><loc>https://blog.b5dev.com/drata-1password-unite-to-deliver-continuous-compliance/</loc></url><url><loc>https://blog.b5dev.com/extended-access-management-for-ai-agents/</loc></url><url><loc>https://blog.b5dev.com/extended-access-management-how-productivity-ai-are-changing-how-we-approach-cybersecurity/</loc></url><url><loc>https://blog.b5dev.com/service-accounts-sdks-agentic-ai/</loc></url><url><loc>https://blog.b5dev.com/1password-q1-2025-usability-updates/</loc></url><url><loc>https://blog.b5dev.com/1password-sdks-programmatic-item-management/</loc></url><url><loc>https://blog.b5dev.com/it-security-use-cases-solved-with-1password-extended-access-management/</loc></url><url><loc>https://blog.b5dev.com/mdm-alone-cant-meet-your-compliance-goals/</loc></url><url><loc>https://blog.b5dev.com/mdm-vs-device-trust-balancing-security-with-productivity/</loc></url><url><loc>https://blog.b5dev.com/add-locations-to-items/</loc></url><url><loc>https://blog.b5dev.com/admin-policies-introduction-guide/</loc></url><url><loc>https://blog.b5dev.com/digital-estate-planning-sara-dave-interview/</loc></url><url><loc>https://blog.b5dev.com/categories/podcast/</loc></url><url><loc>https://blog.b5dev.com/mdm-vs-device-trust-technical-limitations/</loc></url><url><loc>https://blog.b5dev.com/msp-edition/</loc></url><url><loc>https://blog.b5dev.com/how-spot-online-job-scams/</loc></url><url><loc>https://blog.b5dev.com/browser-security-risks-vivek-ramachandran-interview/</loc></url><url><loc>https://blog.b5dev.com/1password-oracle-red-bull-racing-melton-interview/</loc></url><url><loc>https://blog.b5dev.com/sms-based-mfa-risks/</loc></url><url><loc>https://blog.b5dev.com/1password-community-launch/</loc></url><url><loc>https://blog.b5dev.com/hackers-state-emily-crose-interview/</loc></url><url><loc>https://blog.b5dev.com/1password-marketplace-integrations/</loc></url><url><loc>https://blog.b5dev.com/product-update-improvements-and-features/</loc></url><url><loc>https://blog.b5dev.com/1password-acquires-trelica/</loc></url><url><loc>https://blog.b5dev.com/env-file-migration-secure-programming-best-practices/</loc></url><url><loc>https://blog.b5dev.com/get-started-with-1password-families/</loc></url><url><loc>https://blog.b5dev.com/tech-she-can-charity-1password-for-good/</loc></url><url><loc>https://blog.b5dev.com/digital-moment-charity-1password-for-good/</loc></url><url><loc>https://blog.b5dev.com/mission-bit-computer-science-1password-for-good/</loc></url><url><loc>https://blog.b5dev.com/how-divide-shared-1password-account/</loc></url><url><loc>https://blog.b5dev.com/aligning-iso-27001-compliance-1password/</loc></url><url><loc>https://blog.b5dev.com/browser-auto-lock-release-channel-policies/</loc></url><url><loc>https://blog.b5dev.com/meet-ollie-cheal-emea-growth/</loc></url><url><loc>https://blog.b5dev.com/1password-joins-rails-foundation/</loc></url><url><loc>https://blog.b5dev.com/confidential-computing/</loc></url><url><loc>https://blog.b5dev.com/real-cost-search-engines-interview/</loc></url><url><loc>https://blog.b5dev.com/aws-product-partnership-integrations-re-invent/</loc></url><url><loc>https://blog.b5dev.com/how-1password-supports-soc2-compliance/</loc></url><url><loc>https://blog.b5dev.com/leadership-essentials-training-program/</loc></url><url><loc>https://blog.b5dev.com/tips-encourage-1password-use-post-launch/</loc></url><url><loc>https://blog.b5dev.com/1password-ingram-micro-partnership-resellers/</loc></url><url><loc>https://blog.b5dev.com/addressing-security-privacy-compliance-mandates/</loc></url><url><loc>https://blog.b5dev.com/passkeys-story-metrics/</loc></url><url><loc>https://blog.b5dev.com/more-than-compliance-elevate-your-security-posture/</loc></url><url><loc>https://blog.b5dev.com/1password-joins-microsoft-intelligent-security-association/</loc></url><url><loc>https://blog.b5dev.com/managed-vs-personal-apple-accounts/</loc></url><url><loc>https://blog.b5dev.com/better-systems-for-vulnerability-management/</loc></url><url><loc>https://blog.b5dev.com/troy-bettencourt-cost-data-breach-interview/</loc></url><url><loc>https://blog.b5dev.com/new-developer-experience/</loc></url><url><loc>https://blog.b5dev.com/categories/passwordless/</loc></url><url><loc>https://blog.b5dev.com/sierre-wolfkostin-passkeys-interview/</loc></url><url><loc>https://blog.b5dev.com/1password-golden-state-warriors-celebrate-partnership/</loc></url><url><loc>https://blog.b5dev.com/1password-rails-kindred-spirits/</loc></url><url><loc>https://blog.b5dev.com/black-history-month-2024-uk-netherlands/</loc></url><url><loc>https://blog.b5dev.com/end-security-obstructionism-with-human-centric-security/</loc></url><url><loc>https://blog.b5dev.com/device-trust-tailscale-twingate/</loc></url><url><loc>https://blog.b5dev.com/idc-security-report-ciso-checklists/</loc></url><url><loc>https://blog.b5dev.com/1password-tdsynnex-partnership-resellers/</loc></url><url><loc>https://blog.b5dev.com/should-protect-1password-with-2fa/</loc></url><url><loc>https://blog.b5dev.com/how-to-spotlight-search-across-every-mac-with-osquery/</loc></url><url><loc>https://blog.b5dev.com/presenting-the-sensitive-data-report/</loc></url><url><loc>https://blog.b5dev.com/product-update-features-and-security-q3-2024/</loc></url><url><loc>https://blog.b5dev.com/three-tips-drive-1password-adoption-during-onboarding/</loc></url><url><loc>https://blog.b5dev.com/managing-data-breaches-troy-hunt-interview/</loc></url><url><loc>https://blog.b5dev.com/fido-alliance-import-export-passkeys-draft-specs/</loc></url><url><loc>https://blog.b5dev.com/1password-for-good-cybersecurity-awareness-month-2024/</loc></url><url><loc>https://blog.b5dev.com/buying-vs-building-your-own-osquery-solution/</loc></url><url><loc>https://blog.b5dev.com/how-to-set-up-windows-file-integrity-monitoring-using-osquery/</loc></url><url><loc>https://blog.b5dev.com/introducing-mobile-checks-for-device-trust/</loc></url><url><loc>https://blog.b5dev.com/1password-teams-free-business-reports-trial/</loc></url><url><loc>https://blog.b5dev.com/digital-accessibility/</loc></url><url><loc>https://blog.b5dev.com/nist-password-guidelines-update/</loc></url><url><loc>https://blog.b5dev.com/human-side-cyberattacks-erik-huffman-interview/</loc></url><url><loc>https://blog.b5dev.com/do-corporate-vpns-have-a-place-in-a-zero-trust-world/</loc></url><url><loc>https://blog.b5dev.com/your-companys-bossware-could-get-you-in-legal-trouble/</loc></url><url><loc>https://blog.b5dev.com/small-business-cybersecurity-alan-watkins-interview/</loc></url><url><loc>https://blog.b5dev.com/how-the-1password-device-trust-agent-autoupdates/</loc></url><url><loc>https://blog.b5dev.com/is-microsoft-defender-enough-for-soc-2/</loc></url><url><loc>https://blog.b5dev.com/pulumi-esc-secrets-management/</loc></url><url><loc>https://blog.b5dev.com/how-much-does-a-soc-2-audit-cost/</loc></url><url><loc>https://blog.b5dev.com/personal-vpns-can-be-shady/</loc></url><url><loc>https://blog.b5dev.com/how-to-tell-if-crowdstrike-falcon-sensor-is-running/</loc></url><url><loc>https://blog.b5dev.com/patch-macs-with-1password-extended-access-management/</loc></url><url><loc>https://blog.b5dev.com/1password-crowdstrike-partnership/</loc></url><url><loc>https://blog.b5dev.com/aws-marketplace-extended-access-management/</loc></url><url><loc>https://blog.b5dev.com/four-new-administrator-controls-1password-business/</loc></url><url><loc>https://blog.b5dev.com/do-macs-need-antivirus-for-soc-2/</loc></url><url><loc>https://blog.b5dev.com/build-custom-osquery-tables-using-atc/</loc></url><url><loc>https://blog.b5dev.com/guide-to-iso-27001-compliance/</loc></url><url><loc>https://blog.b5dev.com/the-file-table-osquerys-secret-weapon/</loc></url><url><loc>https://blog.b5dev.com/1password-siem-integration-rapid7-blumira-stellar-cyber/</loc></url><url><loc>https://blog.b5dev.com/tracy-chou-personal-data-leaks-interview/</loc></url><url><loc>https://blog.b5dev.com/1password-pulumi-developer-secrets-guide/</loc></url><url><loc>https://blog.b5dev.com/10-minute-guide-to-soc-1-vs-soc-2/</loc></url><url><loc>https://blog.b5dev.com/employees-guide-to-slacks-privacy-policy/</loc></url><url><loc>https://blog.b5dev.com/cpra-will-transform-how-companies-treat-employee-data/</loc></url><url><loc>https://blog.b5dev.com/what-you-need-to-know-about-iso-27000-standards/</loc></url><url><loc>https://blog.b5dev.com/ten-things-about-small-business-cybersecurity/</loc></url><url><loc>https://blog.b5dev.com/healthcare-security-is-a-nightmare/</loc></url><url><loc>https://blog.b5dev.com/how-audio-deepfakes-trick-employees/</loc></url><url><loc>https://blog.b5dev.com/how-tech-money-laundering-works-interview/</loc></url><url><loc>https://blog.b5dev.com/top-11-cybersecurity-podcasts/</loc></url><url><loc>https://blog.b5dev.com/higher-rebates-1password-partners-2024/</loc></url><url><loc>https://blog.b5dev.com/malvertising-on-google-ads/</loc></url><url><loc>https://blog.b5dev.com/what-is-the-deal-with-enterprise-browsers/</loc></url><url><loc>https://blog.b5dev.com/extended-access-management-okta-guide/</loc></url><url><loc>https://blog.b5dev.com/write-new-osquery-table/</loc></url><url><loc>https://blog.b5dev.com/design-values-ux-prinicples/</loc></url><url><loc>https://blog.b5dev.com/extended-access-management-developer-security/</loc></url><url><loc>https://blog.b5dev.com/lock-screen-swiftui-ios-app/</loc></url><url><loc>https://blog.b5dev.com/extended-access-management-patch-management/</loc></url><url><loc>https://blog.b5dev.com/mgm-hack/</loc></url><url><loc>https://blog.b5dev.com/august-2024-security-update/</loc></url><url><loc>https://blog.b5dev.com/can-vdi-secure-byod/</loc></url><url><loc>https://blog.b5dev.com/mac-patch-management/</loc></url><url><loc>https://blog.b5dev.com/sdks-version-0/</loc></url><url><loc>https://blog.b5dev.com/extended-access-management-availability-updates/</loc></url><url><loc>https://blog.b5dev.com/end-of-life-software/</loc></url><url><loc>https://blog.b5dev.com/fluctuating-cyber-liability-insurance/</loc></url><url><loc>https://blog.b5dev.com/explaining-the-access-trust-gap/</loc></url><url><loc>https://blog.b5dev.com/joseph-cox-crime-app-sting-interview/</loc></url><url><loc>https://blog.b5dev.com/authentication-methods/</loc></url><url><loc>https://blog.b5dev.com/history-of-zero-trust/</loc></url><url><loc>https://blog.b5dev.com/unlock-1password-google-identity-platform/</loc></url><url><loc>https://blog.b5dev.com/cybersecurity-bipoc-women-interview/</loc></url><url><loc>https://blog.b5dev.com/get-started-digital-estate-planning/</loc></url><url><loc>https://blog.b5dev.com/1password-microsoft-sentinel-siem/</loc></url><url><loc>https://blog.b5dev.com/ai-browser-extension-nightmare/</loc></url><url><loc>https://blog.b5dev.com/byod-policies/</loc></url><url><loc>https://blog.b5dev.com/unmanaged-devices-run-rampant/</loc></url><url><loc>https://blog.b5dev.com/1password-iso-27001-certified/</loc></url><url><loc>https://blog.b5dev.com/what-is-device-trust/</loc></url><url><loc>https://blog.b5dev.com/improved-search-results-1password/</loc></url><url><loc>https://blog.b5dev.com/password-checklist-students-parents/</loc></url><url><loc>https://blog.b5dev.com/credential-based-data-breaches/</loc></url><url><loc>https://blog.b5dev.com/1password-vs-keeper-security/</loc></url><url><loc>https://blog.b5dev.com/encrypt-data-saved-passkeys/</loc></url><url><loc>https://blog.b5dev.com/how-enforce-security-policies/</loc></url><url><loc>https://blog.b5dev.com/product-update-features-and-security/</loc></url><url><loc>https://blog.b5dev.com/1password-sponsors-presidents-cup/</loc></url><url><loc>https://blog.b5dev.com/no-mdm-for-linux/</loc></url><url><loc>https://blog.b5dev.com/how-mfa-is-falling-short/</loc></url><url><loc>https://blog.b5dev.com/explaining-the-backlash-to-the-sso-tax/</loc></url><url><loc>https://blog.b5dev.com/top-3-cybersecurity-threats-businesses/</loc></url><url><loc>https://blog.b5dev.com/cisa-strong-passwords/</loc></url><url><loc>https://blog.b5dev.com/pride-2024/</loc></url><url><loc>https://blog.b5dev.com/vulnerability-management-goes-much-deeper-than-patching/</loc></url><url><loc>https://blog.b5dev.com/introducing-1password-recovery-codes/</loc></url><url><loc>https://blog.b5dev.com/happy-18th-birthday/</loc></url><url><loc>https://blog.b5dev.com/closing-the-sso-security-gap/</loc></url><url><loc>https://blog.b5dev.com/pros-and-cons-of-mdms/</loc></url><url><loc>https://blog.b5dev.com/new-extension-build-system/</loc></url><url><loc>https://blog.b5dev.com/get-serious-gdpr-compliance/</loc></url><url><loc>https://blog.b5dev.com/asian-pacific-islander-heritage-month-2024/</loc></url><url><loc>https://blog.b5dev.com/how-zero-trust-strategy-interview/</loc></url><url><loc>https://blog.b5dev.com/rsa-2024-conference-takeaways/</loc></url><url><loc>https://blog.b5dev.com/two-checks-chatgpt-macos-app/</loc></url><url><loc>https://blog.b5dev.com/sdk-beta/</loc></url><url><loc>https://blog.b5dev.com/managed-service-provider-beta/</loc></url><url><loc>https://blog.b5dev.com/shadow-it-risks-charlie-livingston-interview/</loc></url><url><loc>https://blog.b5dev.com/introducing-extended-access-management/</loc></url><url><loc>https://blog.b5dev.com/employee-vault/</loc></url><url><loc>https://blog.b5dev.com/verizon-data-breach-report-2024-analysis/</loc></url><url><loc>https://blog.b5dev.com/1password-postman-integration/</loc></url><url><loc>https://blog.b5dev.com/what-work-on-1password-internship/</loc></url><url><loc>https://blog.b5dev.com/online-safety-families-stephen-balkam-interview/</loc></url><url><loc>https://blog.b5dev.com/sisense-credential-breach/</loc></url><url><loc>https://blog.b5dev.com/secrets-management-for-developers/</loc></url><url><loc>https://blog.b5dev.com/local-threats-device-protections/</loc></url><url><loc>https://blog.b5dev.com/ai-ethics-verity-harding-interview/</loc></url><url><loc>https://blog.b5dev.com/business-password-sharing/</loc></url><url><loc>https://blog.b5dev.com/1password-passkeys-apps-and-devices/</loc></url><url><loc>https://blog.b5dev.com/understanding-shadow-it-security-needs/</loc></url><url><loc>https://blog.b5dev.com/productivity-ai-cybersecurity-report/</loc></url><url><loc>https://blog.b5dev.com/business-password-management/</loc></url><url><loc>https://blog.b5dev.com/how-secure-is-my-password/</loc></url><url><loc>https://blog.b5dev.com/enterprise-password-vaults-guide/</loc></url><url><loc>https://blog.b5dev.com/shadow-it-employee-productivity/</loc></url><url><loc>https://blog.b5dev.com/browser-password-manager-guide/</loc></url><url><loc>https://blog.b5dev.com/meet-jess-plowman-tiphanie-futu/</loc></url><url><loc>https://blog.b5dev.com/what-is-shadow-it/</loc></url><url><loc>https://blog.b5dev.com/concept-first-design/</loc></url><url><loc>https://blog.b5dev.com/women-networking-connections-guide/</loc></url><url><loc>https://blog.b5dev.com/apple-device-security-mac-admins-interview/</loc></url><url><loc>https://blog.b5dev.com/1password-labs-features/</loc></url><url><loc>https://blog.b5dev.com/partner-rebate-program/</loc></url><url><loc>https://blog.b5dev.com/greg-van-der-gaast-business-security-interview/</loc></url><url><loc>https://blog.b5dev.com/enterprise-access-management/</loc></url><url><loc>https://blog.b5dev.com/categories/android/</loc></url><url><loc>https://blog.b5dev.com/save-use-passkeys-android/</loc></url><url><loc>https://blog.b5dev.com/why-cybersecurity-for-businesses-matters/</loc></url><url><loc>https://blog.b5dev.com/keep-work-personal-items-separate/</loc></url><url><loc>https://blog.b5dev.com/autofill-saving-extension-improvements/</loc></url><url><loc>https://blog.b5dev.com/improve-productivity-minimize-cost-distributed-teams/</loc></url><url><loc>https://blog.b5dev.com/1password-acquires-kolide/</loc></url><url><loc>https://blog.b5dev.com/beyond-boundaries-hackathon/</loc></url><url><loc>https://blog.b5dev.com/social-engineering-hacker-jayson-e-street-interview/</loc></url><url><loc>https://blog.b5dev.com/find-and-secure-shadow-it/</loc></url><url><loc>https://blog.b5dev.com/global-partner-program/</loc></url><url><loc>https://blog.b5dev.com/celebrating-black-innovators/</loc></url><url><loc>https://blog.b5dev.com/business-leaders-find-hobby-distraction/</loc></url><url><loc>https://blog.b5dev.com/identity-security-in-hybrid-work-environments/</loc></url><url><loc>https://blog.b5dev.com/securing-your-hybrid-workforce/</loc></url><url><loc>https://blog.b5dev.com/bitwarden-vs-1password/</loc></url><url><loc>https://blog.b5dev.com/5-data-breach-tips/</loc></url><url><loc>https://blog.b5dev.com/how-1password-families-friends-relatives/</loc></url><url><loc>https://blog.b5dev.com/watchtower-ssh-keys/</loc></url><url><loc>https://blog.b5dev.com/one-breach-one-leak/</loc></url><url><loc>https://blog.b5dev.com/what-to-do-mother-of-all-breaches/</loc></url><url><loc>https://blog.b5dev.com/what-is-a-data-breach/</loc></url><url><loc>https://blog.b5dev.com/security-trends-predictions-2024/</loc></url><url><loc>https://blog.b5dev.com/how-to-generate-random-password/</loc></url><url><loc>https://blog.b5dev.com/how-save-manage-share-passkeys-1password/</loc></url><url><loc>https://blog.b5dev.com/unlock-1password-individual-passkey-beta/</loc></url><url><loc>https://blog.b5dev.com/email-domain-policy/</loc></url><url><loc>https://blog.b5dev.com/passkeys-quantum-computers-encryption/</loc></url><url><loc>https://blog.b5dev.com/exposed-developer-secrets-gitguardian/</loc></url><url><loc>https://blog.b5dev.com/how-run-virtual-meetings-voices-heard/</loc></url><url><loc>https://blog.b5dev.com/categories/hybrid-work/</loc></url><url><loc>https://blog.b5dev.com/categories/remote-work/</loc></url><url><loc>https://blog.b5dev.com/can-you-hack-plane-ken-munro-interview/</loc></url><url><loc>https://blog.b5dev.com/cfo-why-every-business-needs-1password/</loc></url><url><loc>https://blog.b5dev.com/bug-hunting-katie-paxton-fear/</loc></url><url><loc>https://blog.b5dev.com/how-password-managers-work/</loc></url><url><loc>https://blog.b5dev.com/security-deepfakes-interview-graham-cluley/</loc></url><url><loc>https://blog.b5dev.com/save-store-passwords-on-devices/</loc></url><url><loc>https://blog.b5dev.com/build-organizational-resiliency-interview/</loc></url><url><loc>https://blog.b5dev.com/1password-vs-dashlane/</loc></url><url><loc>https://blog.b5dev.com/jamie-woodruff-ethical-hacking-interview/</loc></url><url><loc>https://blog.b5dev.com/okta-incident/</loc></url><url><loc>https://blog.b5dev.com/hacktoberfest-2023/</loc></url><url><loc>https://blog.b5dev.com/cybersecurity-awareness-month-smart-security/</loc></url><url><loc>https://blog.b5dev.com/1password-vs-lastpass/</loc></url><url><loc>https://blog.b5dev.com/1password-obsidian-security-integration/</loc></url><url><loc>https://blog.b5dev.com/clint-bodungen-chatgpt-security-interview/</loc></url><url><loc>https://blog.b5dev.com/how-ace-1password-interview/</loc></url><url><loc>https://blog.b5dev.com/categories/1password-in-the-browser/</loc></url><url><loc>https://blog.b5dev.com/categories/ios/</loc></url><url><loc>https://blog.b5dev.com/save-use-passkeys-web-ios/</loc></url><url><loc>https://blog.b5dev.com/passkeys-vs-sso-differences/</loc></url><url><loc>https://blog.b5dev.com/data-breach-impact/</loc></url><url><loc>https://blog.b5dev.com/shell-plugins-summer-2023/</loc></url><url><loc>https://blog.b5dev.com/visma-enterprise-password-manager-interview/</loc></url><url><loc>https://blog.b5dev.com/passkey-crates/</loc></url><url><loc>https://blog.b5dev.com/passkey-secret-key-account-security/</loc></url><url><loc>https://blog.b5dev.com/labs-experimental-features/</loc></url><url><loc>https://blog.b5dev.com/policies-update/</loc></url><url><loc>https://blog.b5dev.com/theresa-payton-digital-footprint-interview/</loc></url><url><loc>https://blog.b5dev.com/black-hat-2023/</loc></url><url><loc>https://blog.b5dev.com/scott-shapiro-upcode-hacks-interview/</loc></url><url><loc>https://blog.b5dev.com/2023-1password-hackathon-winners/</loc></url><url><loc>https://blog.b5dev.com/siem-integration-datadog/</loc></url><url><loc>https://blog.b5dev.com/meet-allie-weiner/</loc></url><url><loc>https://blog.b5dev.com/passkeys-2fa-totp-differences/</loc></url><url><loc>https://blog.b5dev.com/privacy-telemetry-deep-dive/</loc></url><url><loc>https://blog.b5dev.com/unlock-passkey-private-beta/</loc></url><url><loc>https://blog.b5dev.com/darknet-diaries-cybercrime-interview/</loc></url><url><loc>https://blog.b5dev.com/microsoft-store/</loc></url><url><loc>https://blog.b5dev.com/categories/windows/</loc></url><url><loc>https://blog.b5dev.com/new-features-unlocked-summer-2023/</loc></url><url><loc>https://blog.b5dev.com/readme-1password-shell-plugin-interview/</loc></url><url><loc>https://blog.b5dev.com/unlock-with-sso-oidc/</loc></url><url><loc>https://blog.b5dev.com/manage-accounts-in-the-1password-app/</loc></url><url><loc>https://blog.b5dev.com/1password-service-accounts/</loc></url><url><loc>https://blog.b5dev.com/openai-chatgpt-exposed-api-keys/</loc></url><url><loc>https://blog.b5dev.com/1password-2fa-passwords-codes-together/</loc></url><url><loc>https://blog.b5dev.com/telemetry-system-roll-out/</loc></url><url><loc>https://blog.b5dev.com/categories/mac/</loc></url><url><loc>https://blog.b5dev.com/wwdc-2023-roundup/</loc></url><url><loc>https://blog.b5dev.com/enterprise-tech-30-list-2023/</loc></url><url><loc>https://blog.b5dev.com/pride-2023/</loc></url><url><loc>https://blog.b5dev.com/apple-passkey-api-wwdc/</loc></url><url><loc>https://blog.b5dev.com/save-sign-in-passkeys-1password/</loc></url><url><loc>https://blog.b5dev.com/2023-1password-hashnode-hackathon/</loc></url><url><loc>https://blog.b5dev.com/passkeys-vs-magic-links-differences/</loc></url><url><loc>https://blog.b5dev.com/passage-by-1password/</loc></url><url><loc>https://blog.b5dev.com/categories/passage/</loc></url><url><loc>https://blog.b5dev.com/ai-cracking-passwords/</loc></url><url><loc>https://blog.b5dev.com/passkeys-faqs/</loc></url><url><loc>https://blog.b5dev.com/aapi-heritage-month-2023/</loc></url><url><loc>https://blog.b5dev.com/github-student-developer-pack/</loc></url><url><loc>https://blog.b5dev.com/google-account-passkey-1password/</loc></url><url><loc>https://blog.b5dev.com/april-2023-service-disruption-update/</loc></url><url><loc>https://blog.b5dev.com/watch-hello-ciso-youtube/</loc></url><url><loc>https://blog.b5dev.com/1password-rsa-conference-2023/</loc></url><url><loc>https://blog.b5dev.com/1password-brand-refresh/</loc></url><url><loc>https://blog.b5dev.com/passwordless-research/</loc></url><url><loc>https://blog.b5dev.com/why-students-1password-university/</loc></url><url><loc>https://blog.b5dev.com/passkeys-vs-passwords-differences/</loc></url><url><loc>https://blog.b5dev.com/learn-more-content-design/</loc></url><url><loc>https://blog.b5dev.com/ransomware-hunting-team-interview/</loc></url><url><loc>https://blog.b5dev.com/1password-service-accounts-beta/</loc></url><url><loc>https://blog.b5dev.com/1password-neovim/</loc></url><url><loc>https://blog.b5dev.com/enforce-hardware-security-key-2fa/</loc></url><url><loc>https://blog.b5dev.com/passkeys-common-misunderstandings/</loc></url><url><loc>https://blog.b5dev.com/events-api-enhancements-2023/</loc></url><url><loc>https://blog.b5dev.com/privacy-preserving-app-telemetry/</loc></url><url><loc>https://blog.b5dev.com/unlock-with-okta/</loc></url><url><loc>https://blog.b5dev.com/protect-your-finances/</loc></url><url><loc>https://blog.b5dev.com/passkeys-the-future-of-authentication/</loc></url><url><loc>https://blog.b5dev.com/golden-state-warriors/</loc></url><url><loc>https://blog.b5dev.com/shell-plugins-roundup/</loc></url><url><loc>https://blog.b5dev.com/random-but-memorable-100/</loc></url><url><loc>https://blog.b5dev.com/meet-megan-barker/</loc></url><url><loc>https://blog.b5dev.com/keep-your-heart-safe-with-1password/</loc></url><url><loc>https://blog.b5dev.com/unlock-1password-with-passkeys/</loc></url><url><loc>https://blog.b5dev.com/disable-browser-password-manager/</loc></url><url><loc>https://blog.b5dev.com/why-trust-1password-cloud/</loc></url><url><loc>https://blog.b5dev.com/reasons-why-developers-love-1password/</loc></url><url><loc>https://blog.b5dev.com/admin-dashboard/</loc></url><url><loc>https://blog.b5dev.com/better-more-useful-1password/</loc></url><url><loc>https://blog.b5dev.com/starter-kit-items-explained/</loc></url><url><loc>https://blog.b5dev.com/doing-good-in-2022-and-beyond/</loc></url><url><loc>https://blog.b5dev.com/unlock-sso-deep-dive/</loc></url><url><loc>https://blog.b5dev.com/internship-what-its-like/</loc></url><url><loc>https://blog.b5dev.com/unlock-with-okta-public-preview/</loc></url><url><loc>https://blog.b5dev.com/dave-newsletter-january-2023/</loc></url><url><loc>https://blog.b5dev.com/categories/newsletter/</loc></url><url><loc>https://blog.b5dev.com/how-1password-protects-your-data/</loc></url><url><loc>https://blog.b5dev.com/password-protect-pdf-files/</loc></url><url><loc>https://blog.b5dev.com/security-trends-predictions-2023/</loc></url><url><loc>https://blog.b5dev.com/not-in-a-million-years/</loc></url><url><loc>https://blog.b5dev.com/password-protect-excel-passwords/</loc></url><url><loc>https://blog.b5dev.com/season-of-giving-cookbook/</loc></url><url><loc>https://blog.b5dev.com/state-of-access-report-permacrisis/</loc></url><url><loc>https://blog.b5dev.com/shell-plugins/</loc></url><url><loc>https://blog.b5dev.com/what-is-hashed-password/</loc></url><url><loc>https://blog.b5dev.com/airbnb-hosts-share-passwords-securely/</loc></url><url><loc>https://blog.b5dev.com/sign-in-with-other-providers/</loc></url><url><loc>https://blog.b5dev.com/tech-industry-response-data-breaches/</loc></url><url><loc>https://blog.b5dev.com/typeshare-for-rust/</loc></url><url><loc>https://blog.b5dev.com/passkeys-are-coming-to-1password/</loc></url><url><loc>https://blog.b5dev.com/what-is-sim-swapping/</loc></url><url><loc>https://blog.b5dev.com/mdm-msi-pkg-installers/</loc></url><url><loc>https://blog.b5dev.com/what-data-breaches-have-in-common/</loc></url><url><loc>https://blog.b5dev.com/navigate-1password-quick-access/</loc></url><url><loc>https://blog.b5dev.com/what-are-passkeys/</loc></url><url><loc>https://blog.b5dev.com/1password-acquires-passage/</loc></url><url><loc>https://blog.b5dev.com/what-is-dictionary-attack/</loc></url><url><loc>https://blog.b5dev.com/personalize-1password-custom-icons/</loc></url><url><loc>https://blog.b5dev.com/what-is-webauthn/</loc></url><url><loc>https://blog.b5dev.com/parenting-and-growing-up-online-report/</loc></url><url><loc>https://blog.b5dev.com/1password-8-apple-watch/</loc></url><url><loc>https://blog.b5dev.com/thanksgiving-2022/</loc></url><url><loc>https://blog.b5dev.com/1password-jetbrains/</loc></url><url><loc>https://blog.b5dev.com/1password-scim-bridge-explained/</loc></url><url><loc>https://blog.b5dev.com/ssh-security-practices-changing/</loc></url><url><loc>https://blog.b5dev.com/what-is-public-key-cryptography/</loc></url><url><loc>https://blog.b5dev.com/1password-sso-what-comes-next/</loc></url><url><loc>https://blog.b5dev.com/how-do-hackers-steal-passwords/</loc></url><url><loc>https://blog.b5dev.com/meet-josh-gorman/</loc></url><url><loc>https://blog.b5dev.com/report-login-fatigue-research/</loc></url><url><loc>https://blog.b5dev.com/1password-google-workspace/</loc></url><url><loc>https://blog.b5dev.com/teachers-cybersecurity-tips-students/</loc></url><url><loc>https://blog.b5dev.com/incident-response-prevent-and-respond/</loc></url><url><loc>https://blog.b5dev.com/git-commit-signing/</loc></url><url><loc>https://blog.b5dev.com/schools-colleges-password-manager/</loc></url><url><loc>https://blog.b5dev.com/what-is-pretexting/</loc></url><url><loc>https://blog.b5dev.com/easier-to-add-save-in-1password-button/</loc></url><url><loc>https://blog.b5dev.com/shift-left-developer-ownership-security/</loc></url><url><loc>https://blog.b5dev.com/what-is-doxing/</loc></url><url><loc>https://blog.b5dev.com/meet-mark-shane-scale/</loc></url><url><loc>https://blog.b5dev.com/1password-forbes-cloud-100/</loc></url><url><loc>https://blog.b5dev.com/1password-8-ios-android/</loc></url><url><loc>https://blog.b5dev.com/duke-university-password-manager-adoption/</loc></url><url><loc>https://blog.b5dev.com/1password-cli-easier-dns-management/</loc></url><url><loc>https://blog.b5dev.com/security-summer-camp/</loc></url><url><loc>https://blog.b5dev.com/hardware-security-keys-explained/</loc></url><url><loc>https://blog.b5dev.com/meet-sean-foster/</loc></url><url><loc>https://blog.b5dev.com/never-lose-old-passwords/</loc></url><url><loc>https://blog.b5dev.com/productivity-hacks-from-1password/</loc></url><url><loc>https://blog.b5dev.com/1password-siem-integration-sumologic-panther/</loc></url><url><loc>https://blog.b5dev.com/docusaurus-documentation-framework/</loc></url><url><loc>https://blog.b5dev.com/sign-in-with-anything-browser-beta/</loc></url><url><loc>https://blog.b5dev.com/1password-file-document-sharing/</loc></url><url><loc>https://blog.b5dev.com/wwdc22-roundup/</loc></url><url><loc>https://blog.b5dev.com/meet-katie-davis/</loc></url><url><loc>https://blog.b5dev.com/1password-visual-studio-code/</loc></url><url><loc>https://blog.b5dev.com/announcing-insights/</loc></url><url><loc>https://blog.b5dev.com/what-is-a-ddos-attack/</loc></url><url><loc>https://blog.b5dev.com/categories/small-talk/</loc></url><url><loc>https://blog.b5dev.com/small-talk-mindfulness-when-surfing-the-web/</loc></url><url><loc>https://blog.b5dev.com/delete-your-example-env-file/</loc></url><url><loc>https://blog.b5dev.com/1password-is-joining-the-fido-alliance/</loc></url><url><loc>https://blog.b5dev.com/strong-unique-voices-celebrating-pride/</loc></url><url><loc>https://blog.b5dev.com/dave-newsletter-may-2022/</loc></url><url><loc>https://blog.b5dev.com/gen-g-quest-for-the-lost-console/</loc></url><url><loc>https://blog.b5dev.com/1password-rippling-automated-provisioning/</loc></url><url><loc>https://blog.b5dev.com/1password-linux-first-birthday/</loc></url><url><loc>https://blog.b5dev.com/1password-8-android-early-access/</loc></url><url><loc>https://blog.b5dev.com/protect-gaming-accounts-scammers/</loc></url><url><loc>https://blog.b5dev.com/guide-journalist-stay-safe-online/</loc></url><url><loc>https://blog.b5dev.com/improve-watchtower-score-1password/</loc></url><url><loc>https://blog.b5dev.com/gaming-money-spend-safely/</loc></url><url><loc>https://blog.b5dev.com/1password-8-for-mac/</loc></url><url><loc>https://blog.b5dev.com/small-talk-smb-recovery-journey/</loc></url><url><loc>https://blog.b5dev.com/update-on-our-recent-service-disruption/</loc></url><url><loc>https://blog.b5dev.com/where-to-store-your-emergency-kit/</loc></url><url><loc>https://blog.b5dev.com/1password-ssh-changed-how-i-work/</loc></url><url><loc>https://blog.b5dev.com/tip-memorable-password-wifi-tv-apps/</loc></url><url><loc>https://blog.b5dev.com/stack-overflow-developers-interview/</loc></url><url><loc>https://blog.b5dev.com/convince-friends-family-password-manager/</loc></url><url><loc>https://blog.b5dev.com/safe-write-down-your-passwords/</loc></url><url><loc>https://blog.b5dev.com/1password-8-ios-early-access/</loc></url><url><loc>https://blog.b5dev.com/y42-1password-case-study/</loc></url><url><loc>https://blog.b5dev.com/secure-home-wifi-network/</loc></url><url><loc>https://blog.b5dev.com/qr-codes-cybersecurity-risks/</loc></url><url><loc>https://blog.b5dev.com/developers-deserve-great-ux/</loc></url><url><loc>https://blog.b5dev.com/dave-newsletter-march-2022/</loc></url><url><loc>https://blog.b5dev.com/what-incognito-private-browsing-mode-does/</loc></url><url><loc>https://blog.b5dev.com/1password-8.6-windows/</loc></url><url><loc>https://blog.b5dev.com/responding-to-the-conflict-in-ukraine/</loc></url><url><loc>https://blog.b5dev.com/1password-ssh-agent/</loc></url><url><loc>https://blog.b5dev.com/1password-cli-2_0/</loc></url><url><loc>https://blog.b5dev.com/managing-company-security-without-stress/</loc></url><url><loc>https://blog.b5dev.com/talking-to-kids-online-safety/</loc></url><url><loc>https://blog.b5dev.com/increasing-our-bug-bounty-investment/</loc></url><url><loc>https://blog.b5dev.com/password-manager-digital-minimalist-lifestyle/</loc></url><url><loc>https://blog.b5dev.com/how-to-reset-password/</loc></url><url><loc>https://blog.b5dev.com/we-stand-with-ukraine/</loc></url><url><loc>https://blog.b5dev.com/phantom-crypto-wallet-1password/</loc></url><url><loc>https://blog.b5dev.com/webcam-security-zoom/</loc></url><url><loc>https://blog.b5dev.com/leaving-your-job-cybersecurity-guide/</loc></url><url><loc>https://blog.b5dev.com/should-you-change-passwords-every-90-days/</loc></url><url><loc>https://blog.b5dev.com/small-talk-customer-data-privacy/</loc></url><url><loc>https://blog.b5dev.com/secure-yourself-digital-declutter-checklist/</loc></url><url><loc>https://blog.b5dev.com/what-is-social-engineering-hacking-101/</loc></url><url><loc>https://blog.b5dev.com/brex-1password/</loc></url><url><loc>https://blog.b5dev.com/doing-good-in-2021-and-beyond/</loc></url><url><loc>https://blog.b5dev.com/how-sso-fits-enterprise-security-framework/</loc></url><url><loc>https://blog.b5dev.com/future-of-1password/</loc></url><url><loc>https://blog.b5dev.com/my-story-mentoring-at-the-collab-lab/</loc></url><url><loc>https://blog.b5dev.com/how-keep-business-secure-great-resignation/</loc></url><url><loc>https://blog.b5dev.com/2021-year-in-review/</loc></url><url><loc>https://blog.b5dev.com/small-talk-beyond-the-office/</loc></url><url><loc>https://blog.b5dev.com/how-1password-keeps-you-safe-from-cyber-attacks/</loc></url><url><loc>https://blog.b5dev.com/how-to-stay-inspired-working-from-home/</loc></url><url><loc>https://blog.b5dev.com/stay-secure-without-burning-out-guide/</loc></url><url><loc>https://blog.b5dev.com/1password-treats-to-wrap-up-the-year-from-daves-newsletter/</loc></url><url><loc>https://blog.b5dev.com/remote-companies-culture-of-security/</loc></url><url><loc>https://blog.b5dev.com/5-reasons-to-stop-using-your-web-browser-password-manager/</loc></url><url><loc>https://blog.b5dev.com/small-talk-security-considerations/</loc></url><url><loc>https://blog.b5dev.com/supporting-sustainable-ocean-alliance/</loc></url><url><loc>https://blog.b5dev.com/data-breach-101-stay-safe-online/</loc></url><url><loc>https://blog.b5dev.com/state-of-access-report-burnout-breach/</loc></url><url><loc>https://blog.b5dev.com/what-the-secret-key-does/</loc></url><url><loc>https://blog.b5dev.com/when-to-use-random-usernames-online/</loc></url><url><loc>https://blog.b5dev.com/coming-together-to-make-a-difference/</loc></url><url><loc>https://blog.b5dev.com/jumpcloud-1password-scim-bridge-launch/</loc></url><url><loc>https://blog.b5dev.com/small-talk-balancing-productivity/</loc></url><url><loc>https://blog.b5dev.com/wills-digital-estate-planning-millennials-survey/</loc></url><url><loc>https://blog.b5dev.com/1password-8-for-windows-is-here/</loc></url><url><loc>https://blog.b5dev.com/1password-8-for-windows-dark-mode-edition/</loc></url><url><loc>https://blog.b5dev.com/how-a-vpn-works/</loc></url><url><loc>https://blog.b5dev.com/making-masked-email-with-jmap/</loc></url><url><loc>https://blog.b5dev.com/why-security-scare-tactics-dont-work/</loc></url><url><loc>https://blog.b5dev.com/guide-to-inherited-digital-estate-plan/</loc></url><url><loc>https://blog.b5dev.com/small-talk-cyberattacks/</loc></url><url><loc>https://blog.b5dev.com/how-the-1password-security-team-evaluates-new-tools/</loc></url><url><loc>https://blog.b5dev.com/psst-item-sharing/</loc></url><url><loc>https://blog.b5dev.com/thanksgiving-2021/</loc></url><url><loc>https://blog.b5dev.com/how-to-hand-over-cryptocurrency/</loc></url><url><loc>https://blog.b5dev.com/1password-and-sso-a-perfect-match/</loc></url><url><loc>https://blog.b5dev.com/fastmail-masked-email/</loc></url><url><loc>https://blog.b5dev.com/cracking-challenge-update/</loc></url><url><loc>https://blog.b5dev.com/ux-keeping-you-at-the-center/</loc></url><url><loc>https://blog.b5dev.com/1password-for-safari/</loc></url><url><loc>https://blog.b5dev.com/1password-best-company-for-remote-workers/</loc></url><url><loc>https://blog.b5dev.com/fastmail-online-privacy/</loc></url><url><loc>https://blog.b5dev.com/1password-8-the-story-so-far/</loc></url><url><loc>https://blog.b5dev.com/1password-8-for-mac-is-now-in-early-access/</loc></url><url><loc>https://blog.b5dev.com/women-in-tech-fastmail/</loc></url><url><loc>https://blog.b5dev.com/security-culture-explained/</loc></url><url><loc>https://blog.b5dev.com/investing-in-our-future-again/</loc></url><url><loc>https://blog.b5dev.com/how-reclaim-your-online-privacy/</loc></url><url><loc>https://blog.b5dev.com/lets-encrypt-donation-wrap-up/</loc></url><url><loc>https://blog.b5dev.com/introducing-events-api/</loc></url><url><loc>https://blog.b5dev.com/password-manager/</loc></url><url><loc>https://blog.b5dev.com/ready-for-macos-monterey/</loc></url><url><loc>https://blog.b5dev.com/why-you-need-a-password-manager/</loc></url><url><loc>https://blog.b5dev.com/generating-strong-passwords/</loc></url><url><loc>https://blog.b5dev.com/securely-monitoring-scim-bridges/</loc></url><url><loc>https://blog.b5dev.com/risks-of-mismanaging-corporate-secrets/</loc></url><url><loc>https://blog.b5dev.com/making-the-juneteenth-pledge/</loc></url><url><loc>https://blog.b5dev.com/1password-8-for-windows-is-now-in-early-access/</loc></url><url><loc>https://blog.b5dev.com/supporting-lets-encrypt/</loc></url><url><loc>https://blog.b5dev.com/wwdc21/</loc></url><url><loc>https://blog.b5dev.com/how-ignoring-the-polp-and-password123-can-cost-you-4.4-million/</loc></url><url><loc>https://blog.b5dev.com/freedom-press-foundation-donations-wrap-up/</loc></url><url><loc>https://blog.b5dev.com/constant-time-comparisons/</loc></url><url><loc>https://blog.b5dev.com/big-changes-to-1password-in-the-browser/</loc></url><url><loc>https://blog.b5dev.com/bug-bounty-updates/</loc></url><url><loc>https://blog.b5dev.com/categories/linux/</loc></url><url><loc>https://blog.b5dev.com/welcoming-linux-to-the-1password-family/</loc></url><url><loc>https://blog.b5dev.com/introducing-archive/</loc></url><url><loc>https://blog.b5dev.com/digital-estate-planning-guide/</loc></url><url><loc>https://blog.b5dev.com/introducing-the-medical-record/</loc></url><url><loc>https://blog.b5dev.com/world-password-day-2021/</loc></url><url><loc>https://blog.b5dev.com/world-press-freedom-day-2021/</loc></url><url><loc>https://blog.b5dev.com/secrethub-acquisition/</loc></url><url><loc>https://blog.b5dev.com/introducing-secrets-automation/</loc></url><url><loc>https://blog.b5dev.com/improved-automated-provisioning/</loc></url><url><loc>https://blog.b5dev.com/save-in-1password-button-with-ramp/</loc></url><url><loc>https://blog.b5dev.com/switch-to-1password-privacy/</loc></url><url><loc>https://blog.b5dev.com/tech-needs-women-interview/</loc></url><url><loc>https://blog.b5dev.com/a-smarter-password-generator/</loc></url><url><loc>https://blog.b5dev.com/women-in-tech/</loc></url><url><loc>https://blog.b5dev.com/what-to-do-when-you-get-a-data-breach-notification/</loc></url><url><loc>https://blog.b5dev.com/leap-from-icloud-keychain-to-1password/</loc></url><url><loc>https://blog.b5dev.com/why-pay-for-1password/</loc></url><url><loc>https://blog.b5dev.com/make-the-leap-to-1password-families/</loc></url><url><loc>https://blog.b5dev.com/love-and-logins/</loc></url><url><loc>https://blog.b5dev.com/upgrade-to-1password-families/</loc></url><url><loc>https://blog.b5dev.com/1password-wins-a-g2-best-software-award/</loc></url><url><loc>https://blog.b5dev.com/what-comb-means-for-you-and-your-business/</loc></url><url><loc>https://blog.b5dev.com/identity-fraud-scams/</loc></url><url><loc>https://blog.b5dev.com/1-in-5-corporate-passwords-include-company-name/</loc></url><url><loc>https://blog.b5dev.com/1password-apps/</loc></url><url><loc>https://blog.b5dev.com/security-success-2021/</loc></url><url><loc>https://blog.b5dev.com/1password-for-good/</loc></url><url><loc>https://blog.b5dev.com/family-password-paradigm/</loc></url><url><loc>https://blog.b5dev.com/what-we-dont-know-about-you/</loc></url><url><loc>https://blog.b5dev.com/1password-slack-enterprise-grid/</loc></url><url><loc>https://blog.b5dev.com/how-to-shop-online-more-safely-with-1password/</loc></url><url><loc>https://blog.b5dev.com/apple-silicon/</loc></url><url><loc>https://blog.b5dev.com/big-sur-1password-7-7/</loc></url><url><loc>https://blog.b5dev.com/random-but-memorable-is-50/</loc></url><url><loc>https://blog.b5dev.com/ghosts-passwords-past/</loc></url><url><loc>https://blog.b5dev.com/troy-hunt-joins-1password/</loc></url><url><loc>https://blog.b5dev.com/domain-breach-report-update/</loc></url><url><loc>https://blog.b5dev.com/randomness-or-things-humans-do-poorly/</loc></url><url><loc>https://blog.b5dev.com/1password-for-linux-beta-is-now-open/</loc></url><url><loc>https://blog.b5dev.com/mental-health-thanksgiving/</loc></url><url><loc>https://blog.b5dev.com/orange-facile-glossary-and-other-questions-answered/</loc></url><url><loc>https://blog.b5dev.com/privacy-virtual-cards/</loc></url><url><loc>https://blog.b5dev.com/1password7-7-for-android/</loc></url><url><loc>https://blog.b5dev.com/guiding-principles-how-least-privilege-leads-to-more-security/</loc></url><url><loc>https://blog.b5dev.com/iam-shadow-it-epm-research-2020/</loc></url><url><loc>https://blog.b5dev.com/dev-internship/</loc></url><url><loc>https://blog.b5dev.com/email-extortion-scams/</loc></url><url><loc>https://blog.b5dev.com/announcing-watchtower-notifications/</loc></url><url><loc>https://blog.b5dev.com/autofill-on-big-sur/</loc></url><url><loc>https://blog.b5dev.com/clipboard-conundrum/</loc></url><url><loc>https://blog.b5dev.com/domain-breach-report/</loc></url><url><loc>https://blog.b5dev.com/wwdc-2020-at-home/</loc></url><url><loc>https://blog.b5dev.com/log-in-with-ease-on-apple-tv/</loc></url><url><loc>https://blog.b5dev.com/cli-1-0-release/</loc></url><url><loc>https://blog.b5dev.com/remote-work-it-survey/</loc></url><url><loc>https://blog.b5dev.com/contact-tracing/</loc></url><url><loc>https://blog.b5dev.com/totp-and-1password/</loc></url><url><loc>https://blog.b5dev.com/rolling-out-1password-tips-for-onboarding-your-team/</loc></url><url><loc>https://blog.b5dev.com/remote-work-security-people/</loc></url><url><loc>https://blog.b5dev.com/secure-all-the-things-with-secure-notes/</loc></url><url><loc>https://blog.b5dev.com/1password-7-5-for-ios/</loc></url><url><loc>https://blog.b5dev.com/1password-7-5-for-android/</loc></url><url><loc>https://blog.b5dev.com/remote-work-shadow-it/</loc></url><url><loc>https://blog.b5dev.com/what-if-1password-gets-hacked/</loc></url><url><loc>https://blog.b5dev.com/remote-work-mental-health/</loc></url><url><loc>https://blog.b5dev.com/work-from-home-setups/</loc></url><url><loc>https://blog.b5dev.com/family-scam-safety/</loc></url><url><loc>https://blog.b5dev.com/what-is-phishing-and-how-can-you-protect-your-business/</loc></url><url><loc>https://blog.b5dev.com/working-from-home-kids/</loc></url><url><loc>https://blog.b5dev.com/remote-work-culture/</loc></url><url><loc>https://blog.b5dev.com/if-you-only-use-1password-in-safari-its-time-to-start-also-using-an-app/</loc></url><url><loc>https://blog.b5dev.com/1password-7-4-for-windows/</loc></url><url><loc>https://blog.b5dev.com/remote-work-security-tips/</loc></url><url><loc>https://blog.b5dev.com/covid-19-response/</loc></url><url><loc>https://blog.b5dev.com/remote-work-tips/</loc></url><url><loc>https://blog.b5dev.com/onelogin-and-1password/</loc></url><url><loc>https://blog.b5dev.com/family-versus-business/</loc></url><url><loc>https://blog.b5dev.com/android-january-release/</loc></url><url><loc>https://blog.b5dev.com/challenges-of-shadow-it/</loc></url><url><loc>https://blog.b5dev.com/brave-default-privacy/</loc></url><url><loc>https://blog.b5dev.com/magic-of-1password-reports/</loc></url><url><loc>https://blog.b5dev.com/interview-with-stina-ehrensvard/</loc></url><url><loc>https://blog.b5dev.com/setup-new-android-device/</loc></url><url><loc>https://blog.b5dev.com/categories/1password-x/</loc></url><url><loc>https://blog.b5dev.com/1passwordx-december-2019-release/</loc></url><url><loc>https://blog.b5dev.com/announcing-scim-digitalocean/</loc></url><url><loc>https://blog.b5dev.com/stay-safe-this-holiday/</loc></url><url><loc>https://blog.b5dev.com/stop-ceo-fraud/</loc></url><url><loc>https://blog.b5dev.com/accel-partnership/</loc></url><url><loc>https://blog.b5dev.com/automate-1password-business/</loc></url><url><loc>https://blog.b5dev.com/1password-on-surface-pro/</loc></url><url><loc>https://blog.b5dev.com/1password-on-pixel4/</loc></url><url><loc>https://blog.b5dev.com/macos-catalina-love/</loc></url><url><loc>https://blog.b5dev.com/1password-glass-room-popup/</loc></url><url><loc>https://blog.b5dev.com/mozilla-extensions-program/</loc></url><url><loc>https://blog.b5dev.com/climate-fixathon/</loc></url><url><loc>https://blog.b5dev.com/making-random-but-memorable/</loc></url><url><loc>https://blog.b5dev.com/ios-fall-2019-release/</loc></url><url><loc>https://blog.b5dev.com/advanced-protection-webinar/</loc></url><url><loc>https://blog.b5dev.com/introducing-advanced-protection/</loc></url><url><loc>https://blog.b5dev.com/trust-browsing-privacy-duckduckgo/</loc></url><url><loc>https://blog.b5dev.com/categories/webinars/</loc></url><url><loc>https://blog.b5dev.com/tracking-blocking-safeguarding-privacy-badger/</loc></url><url><loc>https://blog.b5dev.com/scim-bridge-release/</loc></url><url><loc>https://blog.b5dev.com/starting-college-1password/</loc></url><url><loc>https://blog.b5dev.com/never-better-time-to-upgrade-to-1password-7/</loc></url><url><loc>https://blog.b5dev.com/how-to-protect-your-digital-life-when-you-travel/</loc></url><url><loc>https://blog.b5dev.com/1password-7-2-for-android-dark-theme-rises/</loc></url><url><loc>https://blog.b5dev.com/the-ultimate-guide-to-password-sharing/</loc></url><url><loc>https://blog.b5dev.com/testing-brave-with-1password/</loc></url><url><loc>https://blog.b5dev.com/phishing-fraud-threat-reduction/</loc></url><url><loc>https://blog.b5dev.com/safari-13-is-awesome-upgrade-from-1password-6/</loc></url><url><loc>https://blog.b5dev.com/why-i-switched-to-1password-x/</loc></url><url><loc>https://blog.b5dev.com/1password-apple-betas/</loc></url><url><loc>https://blog.b5dev.com/improve-your-teams-security-with-our-next-webinar/</loc></url><url><loc>https://blog.b5dev.com/scams-malware-preventative-measures/</loc></url><url><loc>https://blog.b5dev.com/passwords-breaches-data-dumps/</loc></url><url><loc>https://blog.b5dev.com/introducing-support-for-u2f-security-keys/</loc></url><url><loc>https://blog.b5dev.com/ios-voice-control-wwdc/</loc></url><url><loc>https://blog.b5dev.com/ios-dark-mode-wwdc/</loc></url><url><loc>https://blog.b5dev.com/bruce-schneier-talks-web-security/</loc></url><url><loc>https://blog.b5dev.com/taking-a-peek-at-microsoft-edge-for-mac/</loc></url><url><loc>https://blog.b5dev.com/1password-7-3-for-our-life-in-miniature/</loc></url><url><loc>https://blog.b5dev.com/how-intent-share-passwords-securely-across-a-global-team/</loc></url><url><loc>https://blog.b5dev.com/effortless-collaboration-how-1password-connects-netgurus-team/</loc></url><url><loc>https://blog.b5dev.com/how-1password-makes-security-and-compliance-simple-for-smartpatient/</loc></url><url><loc>https://blog.b5dev.com/powerful-precise-password-management-for-team-694/</loc></url><url><loc>https://blog.b5dev.com/how-dribbbles-growing-team-handles-password-management/</loc></url><url><loc>https://blog.b5dev.com/collaboration-and-integration-why-wonderbly-use-1password/</loc></url><url><loc>https://blog.b5dev.com/how-meisterlabs-manages-security-for-multiple-sites/</loc></url><url><loc>https://blog.b5dev.com/thoughts-on-mental-health/</loc></url><url><loc>https://blog.b5dev.com/1password-x-may-2019-update/</loc></url><url><loc>https://blog.b5dev.com/csx-the-internal-tool-that-gives-our-support-team-superpowers/</loc></url><url><loc>https://blog.b5dev.com/world-press-freedom-day-1password-journalism/</loc></url><url><loc>https://blog.b5dev.com/how-1password-helps-geckoboard-manage-credentials-as-a-distributed-team/</loc></url><url><loc>https://blog.b5dev.com/how-to-protect-yourself-against-the-next-big-data-breach/</loc></url><url><loc>https://blog.b5dev.com/1password-webby-nomination/</loc></url><url><loc>https://blog.b5dev.com/5-quick-tips-for-smart-home-security/</loc></url><url><loc>https://blog.b5dev.com/storing-important-documents/</loc></url><url><loc>https://blog.b5dev.com/business-essentials-webinar/</loc></url><url><loc>https://blog.b5dev.com/setting-up-1password-at-work-our-webinar-can-help-you-onboard-your-team/</loc></url><url><loc>https://blog.b5dev.com/storing-1password/</loc></url><url><loc>https://blog.b5dev.com/1password-password-book/</loc></url><url><loc>https://blog.b5dev.com/how-to-share-passwords-at-work/</loc></url><url><loc>https://blog.b5dev.com/facebook-password-change/</loc></url><url><loc>https://blog.b5dev.com/using-1password-to-store-software-licenses/</loc></url><url><loc>https://blog.b5dev.com/agconf9-adventures-on-the-high-seas/</loc></url><url><loc>https://blog.b5dev.com/clean-up-digital-footprint/</loc></url><url><loc>https://blog.b5dev.com/come-find-us-at-rsa-conf-2019/</loc></url><url><loc>https://blog.b5dev.com/social-media-sharing/</loc></url><url><loc>https://blog.b5dev.com/using-social-logins/</loc></url><url><loc>https://blog.b5dev.com/get-more-from-1password-business-with-our-next-webinar/</loc></url><url><loc>https://blog.b5dev.com/connection-culture-and-cruising/</loc></url><url><loc>https://blog.b5dev.com/how-to-stay-safe-on-public-wi-fi/</loc></url><url><loc>https://blog.b5dev.com/1password-7-1-for-android-super-awesome-edition/</loc></url><url><loc>https://blog.b5dev.com/selling-your-phone-or-computer-remember-to-wipe-all-of-your-data/</loc></url><url><loc>https://blog.b5dev.com/sms-phishing-tale/</loc></url><url><loc>https://blog.b5dev.com/773-million-collection-1/</loc></url><url><loc>https://blog.b5dev.com/good-password-security-free-family-accounts/</loc></url><url><loc>https://blog.b5dev.com/1password-7-3-for-windows-more-polished-than-ever/</loc></url><url><loc>https://blog.b5dev.com/what-is-email-spoofing-and-how-can-you-protect-yourself/</loc></url><url><loc>https://blog.b5dev.com/introducing-1password-7.3-beta-for-windows/</loc></url><url><loc>https://blog.b5dev.com/improve-your-teams-security-in-2019-with-our-next-webinar/</loc></url><url><loc>https://blog.b5dev.com/does-australias-access-and-assistance-law-impact-1password/</loc></url><url><loc>https://blog.b5dev.com/cyber-hotel-business-hack/</loc></url><url><loc>https://blog.b5dev.com/better-faster-stronger-our-new-blog-and-how-we-made-it/</loc></url><url><loc>https://blog.b5dev.com/setting-up-1password-at-work-our-webinar-can-help/</loc></url><url><loc>https://blog.b5dev.com/how-social-media-games-put-your-security-at-risk/</loc></url><url><loc>https://blog.b5dev.com/how-to-protect-yourself-from-password-reuse-attacks/</loc></url><url><loc>https://blog.b5dev.com/special-thanksgiving-presents-from-1password/</loc></url><url><loc>https://blog.b5dev.com/apps-love-1password/</loc></url><url><loc>https://blog.b5dev.com/lets-all-go-to-the-park-introducing-1password-park/</loc></url><url><loc>https://blog.b5dev.com/immutable-australian-future-wave/</loc></url><url><loc>https://blog.b5dev.com/from-dark-to-light-and-back-again/</loc></url><url><loc>https://blog.b5dev.com/how-to-choose-a-good-password-manager-for-your-business/</loc></url><url><loc>https://blog.b5dev.com/hello-brooklyn-hello-1password-apples-special-event-wrap-up/</loc></url><url><loc>https://blog.b5dev.com/how-often-should-you-change-your-password/</loc></url><url><loc>https://blog.b5dev.com/introducing-1password-for-democracy/</loc></url><url><loc>https://blog.b5dev.com/family-organizer-tips/</loc></url><url><loc>https://blog.b5dev.com/random-but-memorable-the-security-advice-podcast-from-1password/</loc></url><url><loc>https://blog.b5dev.com/1password-7.2-for-mac-welcome-to-the-dark-side/</loc></url><url><loc>https://blog.b5dev.com/how-long-should-my-passwords-be/</loc></url><url><loc>https://blog.b5dev.com/california-password-law/</loc></url><url><loc>https://blog.b5dev.com/a-journey-into-the-new-mac-app-store/</loc></url><url><loc>https://blog.b5dev.com/customers-love-password-autofill-on-ios-and-so-will-you/</loc></url><url><loc>https://blog.b5dev.com/what-is-a-brute-force-attack-and-whats-the-best-defense/</loc></url><url><loc>https://blog.b5dev.com/questions-about-using-1password-for-the-first-time/</loc></url><url><loc>https://blog.b5dev.com/6-questions-to-ask-before-conducting-an-internal-security-audit/</loc></url><url><loc>https://blog.b5dev.com/1password.com-is-now-available-in-multiple-languages/</loc></url><url><loc>https://blog.b5dev.com/1password-x-1.10-large-type-watchtower-and-easy-two-factor-authentication/</loc></url><url><loc>https://blog.b5dev.com/an-open-letter-to-banks/</loc></url><url><loc>https://blog.b5dev.com/are-password-managers-safe/</loc></url><url><loc>https://blog.b5dev.com/finding-pwned-passwords-with-1password/</loc></url><url><loc>https://blog.b5dev.com/toward-better-master-passwords/</loc></url><url><loc>https://blog.b5dev.com/protect-your-data-when-crossing-borders-with-1password/</loc></url><url><loc>https://blog.b5dev.com/1password-7-for-android-the-best-ever/</loc></url><url><loc>https://blog.b5dev.com/a-1password-journey-through-soc2/</loc></url><url><loc>https://blog.b5dev.com/1password-x-1.8-the-independence-update-for-chrome-and-firefox/</loc></url><url><loc>https://blog.b5dev.com/make-a-pitstop-in-denver-and-visit-1password-at-gophercon/</loc></url><url><loc>https://blog.b5dev.com/watchtower-we-shall-fight-on-the-breaches/</loc></url><url><loc>https://blog.b5dev.com/wwdc18-presents-from-apple/</loc></url><url><loc>https://blog.b5dev.com/1password-7-for-windows-the-best-ever/</loc></url><url><loc>https://blog.b5dev.com/1password-7-for-mac-the-best-ever/</loc></url><url><loc>https://blog.b5dev.com/1password-at-google-io/</loc></url><url><loc>https://blog.b5dev.com/using-splunk-with-1password-business/</loc></url><url><loc>https://blog.b5dev.com/getting-1password-7-ready-for-the-mac-app-store/</loc></url><url><loc>https://blog.b5dev.com/learn-how-your-business-is-using-1password-with-reports/</loc></url><url><loc>https://blog.b5dev.com/introducing-watchtower-2.0-the-turret-becomes-a-castle/</loc></url><url><loc>https://blog.b5dev.com/how-strong-should-your-master-password-be-for-world-password-day-wed-like-to-know/</loc></url><url><loc>https://blog.b5dev.com/same-as-it-ever-was-theres-no-reason-to-melt-down/</loc></url><url><loc>https://blog.b5dev.com/multi-factor-authentication-in-1password/</loc></url><url><loc>https://blog.b5dev.com/meet-the-team-that-builds-1password-com/</loc></url><url><loc>https://blog.b5dev.com/introducing-1password-business/</loc></url><url><loc>https://blog.b5dev.com/myfitnesspal-shows-how-to-handle-a-breach/</loc></url><url><loc>https://blog.b5dev.com/the-1password-7-beta-for-mac-is-lit-and-you-can-be-too/</loc></url><url><loc>https://blog.b5dev.com/introducing-1password-7-beta-for-windows/</loc></url><url><loc>https://blog.b5dev.com/1password-x-better-smarter-faster-and-japanese-%E3%83%9E%E3%82%B8%E3%81%A7/</loc></url><url><loc>https://blog.b5dev.com/give-the-gift-of-1password/</loc></url><url><loc>https://blog.b5dev.com/how-to-use-1password-to-manage-cryptocurrency/</loc></url><url><loc>https://blog.b5dev.com/1password-is-for-families/</loc></url><url><loc>https://blog.b5dev.com/developers-how-we-use-srp-and-you-can-too/</loc></url><url><loc>https://blog.b5dev.com/terraforming-1password/</loc></url><url><loc>https://blog.b5dev.com/1password-command-line-tool-0.2-tims-new-toys/</loc></url><url><loc>https://blog.b5dev.com/1password-keeps-you-safe-by-keeping-you-in-the-loop/</loc></url><url><loc>https://blog.b5dev.com/1password-x-a-look-at-the-future-of-1password-in-the-browser/</loc></url><url><loc>https://blog.b5dev.com/1password-7-for-ios-efficiency-abounds/</loc></url><url><loc>https://blog.b5dev.com/1password-living-on-the-microsoft-edge/</loc></url><url><loc>https://blog.b5dev.com/why-is-this-information-sensitive-the-deeper-equifax-problem/</loc></url><url><loc>https://blog.b5dev.com/announcing-the-1password-command-line-tool-public-beta/</loc></url><url><loc>https://blog.b5dev.com/why-we-love-1password-memberships/</loc></url><url><loc>https://blog.b5dev.com/be-your-own-key-master-with-1password/</loc></url><url><loc>https://blog.b5dev.com/introducing-travel-mode-protect-your-data-when-crossing-borders/</loc></url><url><loc>https://blog.b5dev.com/1password-is-layerup-ed-with-modern-authentication/</loc></url><url><loc>https://blog.b5dev.com/more-than-just-a-penny-for-your-thoughts-100000-top-bounty/</loc></url><url><loc>https://blog.b5dev.com/three-layers-of-encryption-keeps-you-safe-when-ssl/tls-fails/</loc></url><url><loc>https://blog.b5dev.com/certificates-provisioning-profiles-and-expiration-dates-the-perfect-storm/</loc></url><url><loc>https://blog.b5dev.com/1password-for-mac-6-5-5-manual-update-required/</loc></url><url><loc>https://blog.b5dev.com/using-intels-sgx-to-keep-secrets-even-safer/</loc></url><url><loc>https://blog.b5dev.com/send-in-the-crowds-to-hunt-for-bugs/</loc></url><url><loc>https://blog.b5dev.com/love-1password-were-hiring/</loc></url><url><loc>https://blog.b5dev.com/how-1password-calculates-password-strength/</loc></url><url><loc>https://blog.b5dev.com/more-watchtower-still-no-watching/</loc></url><url><loc>https://blog.b5dev.com/when-back-doors-go-bad-mind-your-ps-and-qs/</loc></url><url><loc>https://blog.b5dev.com/1password-and-your-browsing-habits-what-we-dont-know-cant-hurt-you/</loc></url><url><loc>https://blog.b5dev.com/back-doors-are-bad-for-security-architecture/</loc></url><url><loc>https://blog.b5dev.com/1password-inter-process-communication-a-discussion/</loc></url><url><loc>https://blog.b5dev.com/how-1password-syncs-changes-to-your-master-password/</loc></url><url><loc>https://blog.b5dev.com/bcrypt-is-great-but-is-password-cracking-infeasible/</loc></url><url><loc>https://blog.b5dev.com/when-is-a-password-leak-not-a-password-leak/</loc></url><url><loc>https://blog.b5dev.com/totp-for-1password-users/</loc></url><url><loc>https://blog.b5dev.com/avoiding-the-clipboard-with-1password-and-android-lollipop/</loc></url><url><loc>https://blog.b5dev.com/viewing-drupal-from-the-1password-watchtower/</loc></url><url><loc>https://blog.b5dev.com/shellshock-is-bad-unique-passwords-are-good/</loc></url><url><loc>https://blog.b5dev.com/watch-what-you-type-1passwords-defenses-against-keystroke-loggers/</loc></url><url><loc>https://blog.b5dev.com/filling-with-your-approval-on-1passwords-app-extension-and-ios-8-security/</loc></url><url><loc>https://blog.b5dev.com/1password-is-a-very-safe-basket/</loc></url><url><loc>https://blog.b5dev.com/1password-openssl-ccs-bugs-passwords/</loc></url><url><loc>https://blog.b5dev.com/1password-watchtower-heartbleed-beyond/</loc></url><url><loc>https://blog.b5dev.com/imagine-no-ssl-encryption-its-scary-if-you-try/</loc></url><url><loc>https://blog.b5dev.com/large-even-prime-number-discovered/</loc></url><url><loc>https://blog.b5dev.com/crackers-report-great-news-for-1password-4/</loc></url><url><loc>https://blog.b5dev.com/1password-security-doesnt-depend-on-ssl/</loc></url><url><loc>https://blog.b5dev.com/dropbox-breach-hoax-1password-security-master-password/</loc></url><url><loc>https://blog.b5dev.com/the-nsa-can-do-what-to-my-iphone/</loc></url><url><loc>https://blog.b5dev.com/adobe-cupid-password-theft-breach-1password-mac-security-audit/</loc></url><url><loc>https://blog.b5dev.com/1password-and-the-crypto-wars/</loc></url><url><loc>https://blog.b5dev.com/just-in-time-decryption/</loc></url><url><loc>https://blog.b5dev.com/nsa-prism-1password-security/</loc></url><url><loc>https://blog.b5dev.com/understanding-sharing/</loc></url><url><loc>https://blog.b5dev.com/1password-hashcat-strong-master-passwords/</loc></url><url><loc>https://blog.b5dev.com/why-we-moved-to-256-bit-aes-keys/</loc></url><url><loc>https://blog.b5dev.com/you-have-secrets-we-dont-why-our-data-format-is-public/</loc></url><url><loc>https://blog.b5dev.com/authenticated-encryption-and-how-not-to-get-caught-chasing-a-coyote/</loc></url><url><loc>https://blog.b5dev.com/doing-the-two-step-until-the-end-of-time/</loc></url><url><loc>https://blog.b5dev.com/alan-turings-contribution-cant-be-computed/</loc></url><url><loc>https://blog.b5dev.com/hashing-fast-and-slow-gpus-and-1password/</loc></url><url><loc>https://blog.b5dev.com/dont-trust-a-password-management-system-you-design-yourself/</loc></url><url><loc>https://blog.b5dev.com/credit-card-numbers-checksums-and-hashes-the-story-of-a-scamming-attempt/</loc></url><url><loc>https://blog.b5dev.com/dropbox-follows-through-on-password-resets/</loc></url><url><loc>https://blog.b5dev.com/dropbox-two-step-authentication-1password/</loc></url><url><loc>https://blog.b5dev.com/guess-what-a-post-it-under-your-keyboard-is-not-the-worst-place-to-keep-a-password/</loc></url><url><loc>https://blog.b5dev.com/on-ars-technicas-most-excellent-comprehensive-review-of-password-security/</loc></url><url><loc>https://blog.b5dev.com/more-than-just-one-password-lessons-from-an-epic-hack/</loc></url><url><loc>https://blog.b5dev.com/blizzard-and-insecurity-questions-my-fathers-middle-name-is-vr2ut1vnj/</loc></url><url><loc>https://blog.b5dev.com/1password-is-ready-for-john-the-ripper/</loc></url><url><loc>https://blog.b5dev.com/password-reuse-dropbox/</loc></url><url><loc>https://blog.b5dev.com/friends-dont-let-friends-reuse-passwords/</loc></url><url><loc>https://blog.b5dev.com/check-out-my-debit-card-or-why-people-make-bad-security-choices/</loc></url><url><loc>https://blog.b5dev.com/flames-and-collisions/</loc></url><url><loc>https://blog.b5dev.com/a-salt-free-diet-is-bad-for-your-security/</loc></url><url><loc>https://blog.b5dev.com/flashback-to-leopard/</loc></url><url><loc>https://blog.b5dev.com/os-x-10-7-4-security-update/</loc></url><url><loc>https://blog.b5dev.com/only-you-should-0wn-your-data-part-3-the-mac-malware-landscape/</loc></url><url><loc>https://blog.b5dev.com/new-problem-for-old-filevault-users/</loc></url><url><loc>https://blog.b5dev.com/only-you-should-0wn-your-data-part-2-staying-safe/</loc></url><url><loc>https://blog.b5dev.com/only-you-should-0wn-your-data-part-1-1password-and-flashback/</loc></url><url><loc>https://blog.b5dev.com/oauth-dropbox-and-your-1password-data/</loc></url><url><loc>https://blog.b5dev.com/cipher-of-advanced-encryption-substitution-and-rotation/</loc></url><url><loc>https://blog.b5dev.com/the-abcs-of-xry-not-so-simple-passcodes/</loc></url><url><loc>https://blog.b5dev.com/already-protected-against-new-ios-phishing-threat/</loc></url><url><loc>https://blog.b5dev.com/1password-final-touch-os-x-mountain-lion/</loc></url><url><loc>https://blog.b5dev.com/1password-ios-pbkdf2-goodness/</loc></url><url><loc>https://blog.b5dev.com/stop-me-if-youve-heard-this-password-before/</loc></url><url><loc>https://blog.b5dev.com/do-you-know-where-your-software-comes-from-gatekeeper-will-help/</loc></url><url><loc>https://blog.b5dev.com/go-tell-it-on-the-mountain-lion-1password-will-be-there/</loc></url><url><loc>https://blog.b5dev.com/time-for-assad-to-change-the-code-on-his-luggage/</loc></url><url><loc>https://blog.b5dev.com/keeping-your-software-up-to-date/</loc></url><url><loc>https://blog.b5dev.com/staying-ahead-with-security/</loc></url><url><loc>https://blog.b5dev.com/defending-against-1password-harvesters/</loc></url><url><loc>https://blog.b5dev.com/steamed-up-and-ready-to-change-passwords/</loc></url><url><loc>https://blog.b5dev.com/two-factor-or-not-two-factor/</loc></url><url><loc>https://blog.b5dev.com/facebook-and-caps-lock-unintuitive-security/</loc></url><url><loc>https://blog.b5dev.com/who-do-you-trust-to-tell-you-who-to-trust/</loc></url><url><loc>https://blog.b5dev.com/1password-to-rule-them-all/</loc></url><url><loc>https://blog.b5dev.com/convenience-is-security/</loc></url><url><loc>https://blog.b5dev.com/aes-encryption-isnt-cracked/</loc></url><url><loc>https://blog.b5dev.com/better-master-passwords-the-geek-edition/</loc></url><url><loc>https://blog.b5dev.com/javascript-grows-up-and-plays-in-a-sandbox/</loc></url><url><loc>https://blog.b5dev.com/dropbox-terms/</loc></url><url><loc>https://blog.b5dev.com/two-thirds-of-web-users-re-use-the-same-passwords/</loc></url><url><loc>https://blog.b5dev.com/dropbox-security-revisited-plus-ca-change/</loc></url><url><loc>https://blog.b5dev.com/defending-against-crackers-peanut-butter-keeps-dogs-friendly-too/</loc></url><url><loc>https://blog.b5dev.com/1password-for-the-playstation/</loc></url><url><loc>https://blog.b5dev.com/looking-ahead-in-security/</loc></url><url><loc>https://blog.b5dev.com/keeping-your-data-at-your-finger-tips-part-i/</loc></url><url><loc>https://blog.b5dev.com/when-websites-are-breached-1password-saves-the-day/</loc></url><url><loc>https://blog.b5dev.com/dropbox-security-questions/</loc></url><url><loc>https://blog.b5dev.com/security-firm-falls-victim-to-password-reuse/</loc></url><url><loc>https://blog.b5dev.com/lost-iphone-safe-passwords/</loc></url><url><loc>https://blog.b5dev.com/1password-data-in-ios-keychain-remains-safe/</loc></url></urlset>