The report reveals that nearly half of tech workers are using shadow IT

The report reveals that nearly half of tech workers are using shadow IT

The struggle to balance productivity and security is becoming more pronounced as employees increasingly turn to advanced technology and personal devices. This change, unfortunately, also exposes them to a 15 percent increase in cyberattacks over the past three years, as reported by IBM.

Dashlane has improved security by incorporating security information and event management (SIEM) tools, including Splunk. The company claims this integration streamlines the monitoring of user activity data, offering a secure method for administrators to access and monitor credential activity logs and event reporting data directly from Splunk.

By configuring alerts within SIEM tools, the integration enables timely detection of suspicious activity, allowing administrators to take action to protect compromised accounts.

To get additional information, 1Password surveyed 1,500 North American workers, including 500 IT security professionals. Half of security experts report that finding the right balance between performance and security is difficult.

In its constant efforts to improve security, Dashlane says it uses confidential computing to protect sensitive logs and data through encryption in a secure enclave. This advanced security measure adds an extra layer of protection, ensuring that sensitive information remains encrypted and isolated from any potential threats during processing.

Confidential computing is a technique that isolates the processing of sensitive data from the rest of the system so that it is processed in a way that is inaccessible to the operating system.

1Password reports that four out of five security professionals believe their current security measures are inadequate. This is especially concerning given that many employees work remotely or in hybrid environments, often using personal devices. As a result, sensitive data can flow through sanctioned and unsanctioned applications, including corporate productivity suites and file sharing services.

Keeper Security has integrated password management into its platform, supporting both iOS and Android. The company claims that this feature aims to give users access to websites and apps across different browsers and operating systems without the need for traditional passwords.

Access keys rely on public-key cryptography, where the private authentication key remains on the device and only the public key is shared with the service being accessed. Keeper Security assures that this method significantly reduces the risk of cyberattacks and data breaches, as authentication is not stored on external servers.

Keeper access keys are stored in Keeper Vault, a secure digital vault that offers encrypted storage. The company emphasizes that it protects these keys using its zero-knowledge security model.

“As the popularity of this exciting new authentication method grows, we understand that users need a platform that provides secure management of multiple login methods – including both passwords and traditional passwords. In this hybrid world, Keeper delivers a seamless experience across operating systems and devices,” said Craig Lurie, CTO and co-founder of Keeper Security.

Article topics

1Password | cyber security | Dashlane | identity access management (IAM) | Keeper Security | passwords | passwordless authentication

Latest biometric news

Proposed bipartisan legislation would “address capability gaps” at border crossings by requiring the Department of Homeland Security (DHS) to develop…

Self-Sovereign Identity (SSI) has long been an aspiration for many people working on digital identity and access to online services…

Chipmaker Hailo has successfully closed a $120 million Series C funding round to support the growing importance of its AI…

The initial launch of the EES border control system is expected to cause greater delays at ports than at airports. These…

The digital identification numbers derived from Paraguay’s national ID card and driver’s licenses are already accepted as their legal equivalents, but…

The NFID Foundation officially launched with a virtual event focused on Decentralized Identification and Self-Sovereign Identity (SSI), and the role…

Leave a Comment

Your email address will not be published. Required fields are marked *