News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Dual authentication is a challenge
Dual authentication is a challenge

Many companies use hybrid authentication with passkeys and passwords to counter the ever-high risk of phishing. The Security Insight Report examines the strategies used by organizations to protect sensitive data and identities in the face of an increasingly complex digital environment. Keeper Security, provider of the zero-trust and zero-knowledge solution Privileged Access Management (PAM) software for protecting passwords, passkeys, privileged access and remote connections, has published its latest Insight Report "Navigating a Hybrid Authentication Landscape". Traditional authentication increasingly insecure The report examines how organizations' strategies are evolving to protect sensitive data and identities...

Read more

Cybersecurity Risks from DeepSeek
Cybersecurity Risks from DeepSeek

Using AI platforms such as DeepSeek may be a step forward, but companies need to carefully weigh the risks - especially when it comes to platforms where there is little transparency about data access and monitoring. Entering sensitive corporate data into such systems could expose critical data to government-controlled surveillance or misuse, creating a Trojan horse for a company and all its employees. This also has significant implications for BYOD (Bring Your Own Device) and user-level security, as employees may use this application…

Read more

Assess and actively defend against threats
Assess and actively defend against threats

Keeper Security's Risk Management Dashboard gives administrators a clear overview of the company's security. Dynamic benchmarks help them identify and assess vulnerabilities and threats in real time. They receive recommendations on how best to mitigate the threats. Keeper Security, a leading provider of zero-trust and zero-knowledge solutions for protecting passwords, passkeys, privileged access and remote connections, is introducing its Risk Management Dashboard. This new feature within the Keeper Admin Console gives administrators a comprehensive insight into the company's security practices and compliance situation, setting a new standard for...

Read more

Similarities and differences between PIM and PAM
Similarities and differences between PIM and PAM

It is not uncommon for the tasks and goals of the two principles of PIM and PAM for secure identification and its management to be mixed up. It is important for companies to know what they can actually achieve with which solutions. In a time when language and terms are often reduced to three letters, it is important that facts do not get mixed up. The same applies to Privileged Identity Management (PIM) and Privileged Access Management (PAM). Both serve to ensure security for companies, but with very different focuses. In this article, PIM and PAM are differentiated from one another...

Read more

AI-supported attacks challenge companies
AI-supported attacks challenge companies

A cybersecurity provider has released the latest results of a survey of IT leaders. The data shows that AI is making it more difficult to detect phishing and smishing attacks. 84 percent of IT leaders acknowledge the increasing challenge. The emergence and continuous development of artificial intelligence (AI) is changing cybersecurity and introducing new complexity in detecting and defending against threats. New research from Keeper Security, a leading provider of zero-trust and zero-knowledge solutions for protecting passwords, passkeys, privileged access and remote connections, shows that while organizations are implementing AI-related policies, they are still failing to…

Read more

Protecting Android mobile devices with passphrases
Protecting Android mobile devices with passphrases

Passphrases are longer and more complex than simple passwords. They can be easily created using a passphrase generator. A leading provider of zero-trust solutions has now expanded its passphrase generator for Android mobile devices. Keeper Security is adding a passphrase generator to its mobile platform. This new functionality is now available for Android devices and helps users develop strong and unique login credentials for their accounts. This is a response to the growing risks posed by sophisticated cyber threats. Passphrase for iOS will be available in the coming weeks. Passphrases are harder to…

Read more

Self-deleting records increase security
Time-limited access protects company data

To protect sensitive data and systems from unauthorized access, Keeper Security has developed new sharing and access functions: self-deleting records and time-limited access. Keeper Security introduces two new privileged access features: Time-Limited Access and Self-Destructing Records. These functions were developed specifically for encrypted access to data sets and their sharing. They offer quick and secure access authorization as well as the option to revoke previously assigned rights. This reduces the accumulation of unnecessary privileges and reduces…

Read more

Cyber ​​attacks are becoming increasingly sophisticated
Cyber ​​attacks are becoming increasingly sophisticated

A leading provider of zero-trust and zero-knowledge solutions for protecting credentials, privileged access and remote connections, releases key findings from its latest study on current cybersecurity developments. The global survey of more than 800 IT security leaders found that the vast majority (95 percent) believe cyberattacks are now more sophisticated than ever before. AI-powered attacks are the most serious and phishing attacks are widely believed to be the fastest growing. Looking ahead to 2024, the cybersecurity landscape presents a mix of frightening factors, with emerging AI threats looming large…

Read more

Privileged Access Management (PAM) is moving to the cloud
Privileged Access Management (PAM) is moving to the cloud

A leading provider of zero-trust and zero-knowledge solutions for protecting credentials, privileged access and remote connections, releases the results of the Keeper Security Insight Report “Cloud-based Privileged Access Management (PAM)”. The report examines what IT and security leaders want from a PAM solution and the benefits of moving away from on-premise installations. 82 percent of respondents said they would be better off moving their PAM solution from on-premises to the cloud. Only 36 percent of IT leaders said an on-premise PAM solution makes sense given the current economic climate. PAM is essential…

Read more

Signed Git commits protect software supply chains
Signed Git commits protect software supply chains

A new open source project allows software developers and DevOPs to digitally sign Git commits easily and securely. A Git commit is a version control system that tracks changes in software projects. A Git commit is a snapshot that captures changes at a specific point in time, accompanied by a short report describing the adjustments. Keeper and The Migus Group developers are collaborating to develop an open source solution for signing Git commits with SSH keys stored in a user's Keeper Vault. The integration provides developers with a secure and encrypted repository for their SSH keys and eliminates the…

Read more