Most Recent Posts

What Is a Passphrase, and How Can I Create One?
Learn what a passphrase is, how to create one, and how they stack up against passwords.

What is Passwordless Authentication, and Why Should You Care?
Passwordless authentication is finally a reality, and it’s time to dip your toes into this new login method. Learn how it works.

How to Erase Saved Browser Passwords: Step-by-Step Guide
Follow our step-by-step guide on how to erase saved passwords from web browsers as you transition to a secure stand-alone password manager.

Preparing for the Quantum World
Last summer, we blogged about our explorations of quantum cryptography. As a reminder, quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. On Github, we released our exploration project that provides JS bindings and a playground of a post-quantum asymmetric cipher compiled in WebAssembly. The next step was to integrate […]

Celebrating IT Heroes at Small Businesses: How They’ve Created a Strong Cybersecurity Culture, and Why That Matters
Small and mid-size businesses (SMBs) need a robust cybersecurity solution, just like larger companies. Here’s what’s worked for these organizations.

What Is a Good Password? 5 Tips for Increasing Password Strength
What is a good password? We explain how to make a secure password and suggest strong password storage methods you can use.

Top 5 Takeaways from the Authenticate 2022 Conference
Learn more about passkeys and hear our key takeaways from Authenticate 2022, a conference dedicated to user authentication and FIDO standards.

6 Reasons Why Your Business Needs Cyber Insurance
Cyber insurance can protect a business from financial losses. Learn about what cyber insurance covers and why cybersecurity insurance coverage is important.

How To Remember Hard-To-Remember Passwords
Memorizing passwords can be risky if you choose an unsafe method. Here’s how to remember strong passwords using a password manager.

How to Select the Best Password Manager for Your Wants and Needs
Password managers may seem similar, but there are two criteria for evaluating the big differences in security features and the user experience.