by Jeffrey Goldberg on
SSH key management practices reflect the environment in which they were first introduced. The 1Password SSH agent is a big step toward aligning practices with the modern world.
10 min readContinue reading
Encryption is an essential step in cybersecurity that protects confidential information by turning it into scrambled gibberish. This ensures attackers can’t understand it, and only trusted individuals can make it understandable again.Continue reading
Single sign-on (SSO) and 1Password make a great team. Separately, 1Password and SSO each reduce your attack surface by securely logging you in to sites and services you use to get things done. Together, they’re a powerful risk reduction duo.Continue reading
You’ve probably watched at least one movie or TV show where a hacker sneaks into someone’s house, finds a computer, and then guesses the password on the first try. They then declare, “I’m in!” before downloading reams of sensitive data.Continue reading
Have you ever wondered what it’s like to work at 1Password? Or wanted to know the career paths that other people followed before taking a job here? You’re not alone!Continue reading
Ever heard of pretexting? And no, we’re not talking about when you first carefully draft a risky text message before sending it! Pretexting is a sneaky and highly effective form of social engineering that attackers use to dupe people into sharing their personal information.Continue reading