FEATURED BLOG

Keeper Announces Automated Password Rotation

Regular rotation of passwords, keys and privileged credentials is a critical best practice that greatly reduces an organization’s risk of falling victim to cyberattacks. By limiting the lifespan of a...

Continue Reading

Search

Latest Keeper Blogs

It’s the holiday season, and at Keeper that means our thoughts turn to security. Actually they turn to security every other time of the year, too, but now is when we think about what we could give that’s a little different. If you’re a Keeper customer, you already have password security covered. Here are some

10 Security-Themed Gifts for the Cybersecurity Nerds in Your Life

With a new year just over the horizon, we asked six security experts for their views and opinions on what events and trends will unfold in 2017 in the cyber security space. These are people that have spent a great deal of time and energy on the front lines of the contemporary threat environment. 1)

Six Security Experts Offer Cybersecurity Predictions for 2017

Per Thorsheim, 45, has a self-described “insane” interest in passwords. As one of the world’s foremost security consultants focused solely on passwords, Thorsheim is the founder of PasswordsCon, the respected academic conference where international password security experts gather twice per year in Las Vegas and Europe. He spoke with us from his home in Bergen,

Keeper Q&A: Password Tips with PasswordsCon Founder, Per Thorsheim

What do the words and advice of a former, highly successful CEO of IBM have in common with sound password management? The answer is surprising. Lou Gerstner, who propelled IBM to nearly 10 years of non-stop growth and prosperity, has a poignant message for top executives at all companies. When it comes to establishing corporate

4 Things Senior Execs Must Do To Evangelize Password Security

Dr. Michael Pound’s current research focuses on image analysis for phenotyping crops, but you don’t have to be an expert in agriculture – or even computer science – to be frightened by this Computerphile video in which Pound demonstrates a deep-learning server called Beast at the University of Nottingham. Beast uses four parallel graphics processing

Keeper Q&A: What You Can Learn From Michael Pound’s Scary Password-Cracking Video

PDF version here. Cyber security becomes more important every day as hackers continue to target users for personal information that can be sold for a profit on the dark web. With more than 10 million consumers engaged with Keeper on a daily basis, we thought it would be a good idea to find out a

Keeper Customer Profile: Mike Maddaloni

Benjamin Caudill – a veteran penetration tester – has broken into organizations, large and small, just about everywhere. In doing so, he has exposed security vulnerabilities and numerous pathways for hackers to do their worst to unsuspecting businesses. Caudill, who was dubbed a ‘deadly force that could easily penetrate and exploit a firm’s most private

Q&A with Benjamin Caudill: Five Most Vital Cybersecurity Considerations for the SMB

Two years ago the CIO at Quest Credit Union  had no problem extending responsibility for password management beyond just the IT department. That’s because C-suite executives were using a password management solution for personal use. Thus getting the the organization aligned with an enterprise password management solution was almost automatically a shared responsibility. There are

Password Management Is Much More Than an IT Problem

1) These five user passwords accounted for 3.2 million of the 130 million accounts that were stolen in the Adobe hack of 2013: “123456,” “12345678,” “Password,” “Adobe123” and “12345678.” source 2) An analysis of 11 million stolen passwords for cloud services conducted by Skyhigh Networks found that just 20 passwords constitute 10.3% of all passwords in

20 Fascinating Password Facts That Show Why Password Security is Important

Regulators in New York State are proposing tough new restrictions on banks that could require them to spend millions of dollars on cyber security protection. We recommend you keep an eye on this proposed legislation in case it becomes a model for other states and industries. Among the measures in the proposed regulations, which are

Proposed New York Cybersecurity Rules Merit Our Attention

What’s Trending