PODCAST
Who’s responsible for AI? Verity Harding on AI policy and ethics
Who’s responsible for regulating technological change in a democracy?
Continue readingWho’s responsible for regulating technological change in a democracy?
Continue readingThis is the third in a series of four posts about shadow IT, including how and why teams use unapproved apps and devices, and approaches for securely managing it. For a complete overview of the topics discussed in this series, download Managing the unmanageable: How shadow IT exists across every team – and how to wrangle it.
Continue readingWhat’s good for business is often bad for security. That’s the inescapable conclusion of the 1Password State of Enterprise Security Report this year.
Continue readingThis is the second in a series of four posts about shadow IT, including how and why teams use unapproved apps and devices, and approaches for securely managing it. For a complete overview of the topics discussed in this series, download Managing the unmanageable: How shadow IT exists across every team – and how to wrangle it.
Continue reading1Password’s Go-to-Market (GTM) team is critical to achieving our mission of helping businesses, families, and individuals protect their passwords and other private information.
Continue readingThis is the first in a series of four posts about shadow IT, including how and why teams use unapproved apps and devices, and approaches for securely managing it.
Continue reading