Keeper Announces Automated Password Rotation

Regular rotation of passwords, keys and privileged credentials is a critical best practice that greatly reduces an organization’s risk of falling victim to cyberattacks. By limiting the lifespan of a...

Continue Reading


Latest Keeper Blogs

A cyberattack is an attack on computers, networks or systems by cybercriminals in an attempt to steal or access sensitive information. The information stolen during an attack can also open the door to other types of cyberattacks such as social engineering scams.  Continue reading to learn more about cyberattacks and what you can do to

What is a Cyberattack?

The best and most secure way to store cryptocurrency private keys, passwords and mnemonic phrases is in a password manager. A password manager encrypts all data, making it a secure option for storing what you need to access your cryptocurrency without it getting into the wrong hands.  Read on to learn more about cryptocurrency and

What is the Most Secure Way to Store Cryptocurrency?

KuppingerCole Analysts AG, a global information-security analyst firm, named Keeper Security a leader in its 2023 Leadership Compass – Secrets Management report based on product strength, market presence and innovation. Specifically designed to fully manage and protect an organization’s cloud infrastructure with zero-trust and zero-knowledge security, Keeper Secrets Manager (KSM) was rated as a top

Eliminating Secrets Sprawl: Keeper Secrets Manager Named an Overall Leader in KuppingerCole’s 2023 Report

You may be hearing about password sharing more often these days as Netflix cracks down on users sharing logins with anyone outside their household. The new rule has been met with strong opposition by those who share streaming logins with friends and family. For many, password sharing has become the norm when it comes to

What is Password Sharing?

Keeper Security continually invests in new, more robust technologies to counter emerging threats. That’s why Keeper is upgrading our account recovery process via a new and more secure 24-word “recovery phrase” feature, replacing the current user-customizable security question-and-answer recovery method. What are Recovery Phrases? A 24-word recovery phrase is a break-glass method of recovering your

Introducing 24-Word Recovery Phrases – The Most Secure Recovery Method

From generating strong passwords to monitoring the security policies and practices of a company, password managers are powerful solutions that defend companies against cyberthreats and improve employee productivity. Continue reading to learn more about why password management is critical to every organization’s cybersecurity strategy.  What is a Cybersecurity Strategy? A cybersecurity strategy is a plan

Password Management is Critical to Your Cybersecurity Strategy

Healthcare organisations across Europe must take precautions to protect their systems to reduce their risk of cyberattacks. Ransomware Is a Growing Threat for European Healthcare Organisations Every day, it appears that a different hospital is making headlines due to a data violation. Cybercriminals are increasingly targeting healthcare. According to a global study of healthcare IT

Code Blue: Cyber Crashing European Healthcare

The Office of Inspector General (OIG) recently evaluated the Department of Commerce’s (DOC) cybersecurity program, uncovering critical failures that exposed the DOC to potential risks. Specific issues included the use of default passwords for administrative accounts, compromising over 100,000 pieces of personal identifiable information (PII). These findings emphasize the urgent need for improvements to safeguard

Closing the Cybersecurity Front Door: Addressing the Federal Government’s Security Gaps

Organizations spend billions of dollars on cybersecurity tools and consultants each year. Beyond traditional tools like firewalls, antivirus software, and System Information and Event Management (SIEM), it is easy to get caught up in sophisticated threat detection using artificial intelligence, machine learning, user behavior and analytics. All of these tools have their place and can

Password Security Best Practices for Businesses

SIM swapping is when a cybercriminal impersonates someone in order to convince a mobile carrier to activate a new SIM card. These bad actors use social engineering tactics, claiming “their phone” was supposedly lost, stolen or damaged, when in reality, it was never their phone to begin with. When a cybercriminal successfully SIM swaps, they

What is SIM Swapping?

What’s Trending