
Cybersecurity
Allow, Warn, Block: A Practical AI Governance Model for Lean Teams
May 21, 2026 • By Shireen Stephenson

Cybersecurity
Identity-first security for Financial Services: Your best defense against AI credential sprawl
May 20, 2026 • By Shireen Stephenson

Cybersecurity
6 Shadow IT Solutions for Companies in 2026
May 18, 2026 • By LastPass

Cybersecurity
Model Context Protocol (MCP) Risk: How to Govern Credentials AI Agents Rely On
May 15, 2026 • By Shireen Stephenson

Cybersecurity
AI App Inventory for Professional Services: How to Gain Visibility Without Breaking Client Delivery
May 06, 2026 • By Shireen Stephenson

Cybersecurity
Browser Based Credential Attacks: How Modern Identity Security Stops the Newest Variants (2026)
April 29, 2026 • By Shireen Stephenson

Cybersecurity
How AI-powered Infostealers are Rewriting the Playbook on Credential Theft (2026)
April 28, 2026 • By Shireen Stephenson

Cybersecurity
How to Ensure AI Access Security for Your Next SOC 2 Audit
April 24, 2026 • By Shireen Stephenson

Cybersecurity
Inside the shadows: The new SaaS security risks of Shadow AI in 2026
April 15, 2026 • By Shireen Stephenson

Cybersecurity
Non‑Human Identities Are a Growing AI Security Risk — Here’s Why
April 13, 2026 • By Shireen Stephenson

Cybersecurity
8 Ways to Protect Against Ransomware Attacks
March 24, 2026 • By LastPass

Cybersecurity
How to Conduct User Access Reviews in Your Organization
March 18, 2026 • By LastPass
