SECURITY
TIPS & ADVICE
Why you should care about a data breach
Data. Breach. We see these two words all the time in the news, on social media, and in company emails notifying us that our information might have been affected.
Continue readingData. Breach. We see these two words all the time in the news, on social media, and in company emails notifying us that our information might have been affected.
Continue reading1Password Shell Plugins bring one-touch access to programmers' favorite command line interfaces (CLIs). I’ll never get tired of cutting steps from what was once a manual process, especially if we can secure that workflow in the process. And that’s exactly what shell plugins do.
Continue readingWhy do businesses choose 1Password over other options on the market? We have a few ideas but thought it would be better to ask one of our customers directly.
Continue readingYou may have heard that 1Password beta testers can sign into websites using passkeys stored in their vaults. We’re actively developing the internal library powering passkey authentication, and now we’re open-sourcing it!
Continue readingAccount password. Secret Key. These two pieces of information have been the backbone of 1Password’s security model for years. The Secret Key in particular is what makes 1Password fundamentally different to other password managers, and why you can be confident that your data is always safe, even if someone breached our servers.
Continue readingWe’re incredibly excited to introduce labs, a new space in the 1Password apps that lets customers test new experimental features to help influence the future of 1Password.
Continue reading