Your passwords and other private information are precious. Learn why you can trust 1Password and its cloud-based storage and syncing to keep them safe.| 1Password Blog
I’ve always wanted to write a technical followup to an earlier post, Toward Better Master Passwords, but this time going into some of the math behind it.| 1Password Blog
John the Ripper, the password cracking tool, is getting ready to take on 1Password. Read here how password cracking tools help 1Password to keep you secure online.| 1Password Blog
Hashcat is a password cracking tool that recently increased its ability to guess Master Passwords for 1Password data files. Read here about the achievements of hashcat.| 1Password Blog
Item sharing is a secure way to share passwords with anyone – even people who don’t use 1Password. Learn more about item sharing and how it works.| 1Password Blog
1Password and Fastmail have partnered to create Masked Email. This makes it easy to create new, unique email addresses that protect your real email address.| 1Password Blog
Discover where MCP fits, and doesn’t, in securing the agentic future. Learn why 1Password’s MCP Server for Trelica uses MCP safely for metadata, and why credentials should never be exposed through AI-driven workflows.| 1Password Blog
Discover why companies can no longer ignore the longstanding advice to phase out SMS-based multi-factor authentication.| 1Password Blog
Electronic health records are valuable user data that must be stored securely. Learn how our password manager safely stores your medical records.| 1Password Blog
1Password is great for generating strong, random passwords for sites without you ever having to memorize (or even see) those passwords.| 1Password Blog
Phishing attacks trick people into giving away sensitive details like passwords and credit card numbers. Learn how to keep your business safe from phishing.| 1Password Blog
Public-key cryptography is an important security protocol. Learn what it means, and how it relates to technologies like HTTPS and passwordless authentication.| 1Password Blog
Brute force attacks are repeated attempts to guess your password, PIN number, or passcode. Here’s what you need to know, and how to increase your security.| 1Password Blog
Social engineering manipulates people into sharing their personal information. Learn more about this technique and how to spot when you’re being targeted.| 1Password Blog
Today we’re announcing that our Go implementation of SRP is available as an open source project.| 1Password Blog
We detected suspicious activity on our Okta instance that we use to manage our employee-facing apps. We immediately terminated the activity, investigated, and found no compromise of user data or other sensitive systems, either employee-facing or user-facing.| 1Password Blog
Manage administrative tasks like invites, guests, and more directly from the 1Password app.| 1Password Blog
1Password Business customers can now unlock 1Password with Duo, OneLogin, JumpCloud, and other identity providers that support the generic OpenID Connect (OIDC) configuration.| 1Password Blog
Passkeys let you securely sign in to accounts without entering a password. Learn more about what they are, and how they differ from traditional passwords.| 1Password Blog
1Password 8 is a huge undertaking so far, and we are dedicated to creating top-tier experiences across all of our platforms. Read about our journey & features of 1Password 8.| 1Password Blog
Passkeys are a new of protecting your online accounts. Learn some common misunderstandings about passkeys, and how they really work to keep you and your data secure.| 1Password Blog
1Password Business customers can now unlock 1Password with Okta, eliminating the need for an account password and closing the gaps that SSO alone can’t fill.| 1Password Blog
We’re all-in on passkeys, and we’re starting with 1Password.| 1Password Blog
Learn about the latest improvements coming to 1Password 8 for iOS, Android, Mac, Windows, and Linux.| 1Password Blog
Learn how 1Password built Unlock with SSO while ensuring that no-one but you can access the data in your vaults.| 1Password Blog
Learn more about the public preview of Unlock with Okta, which is now available for all 1Password Business customers.| 1Password Blog
How 1Password protects your sensitive data, and why an attack on 1Password would pose no threat to information stored in your vaults.| 1Password Blog
Passkeys let you securely sign in to accounts without a password. Find out what passkeys are and how they work with 1Password today.| 1Password Blog
Learn what dictionary attacks are, how hackers use them to try to break into accounts, and what you can do to protect yourself from this hacker technique.| 1Password Blog
The wait is over. 1Password for Linux is officially here.| 1Password Blog
Developers can now use 1Password to set up and use SSH keys to sign Git commits, building on 1Password’s already robust support for SSH keys.| 1Password Blog
Security keys prove that you or someone you trust is trying to sign in to something. Learn how security keys work and whether you should be using one.| 1Password Blog