SECURITY
XAM
Malvertising on Google Ads: It's hiding in plain site
Look closer before clicking that link at the top of your search results.
Continue readingLook closer before clicking that link at the top of your search results.
Continue readingEnterprise browsers are built on a sensible idea, but how they work in practice can be another story.
Continue reading1Password® Extended Access Management includes (among other things) a device trust agent.
Continue readingOne of my favorite features of osquery is the delightful user experience associated with developing new virtual tables.
Continue readingIf you work on a small team, designing by vibes (also known as intuition-based design) might feel like a natural and convenient way to get things done. The rules of design are understood, even if they’re often unspoken, and there’s no pesky documentation to get in the way.
Continue readingWith 1Password Extended Access Management, customers can now require users to secure unencrypted SSH keys on their devices by importing them into 1Password before they can access sensitive company data.
Continue reading