Blog
Recent
Cover Image for AI App Inventory for Professional Services: How to Gain Visibility Without Breaking Client Delivery
Cybersecurity
AI App Inventory for Professional Services: How to Gain Visibility Without Breaking Client Delivery
May 06, 2026 • By Shireen Stephenson
Cover Image for How an Australian Accounting Firm Replaced Sticky Notes with a Secure Access Foundation
News & Insights
How an Australian Accounting Firm Replaced Sticky Notes with a Secure Access Foundation
May 05, 2026 • By Becca Gage
bg
Subscribe & Save 20% off Premium or Families plans

By subscribing, you agree to receive marketing communications regarding industry news and research, educational resources, and LastPass products and services. The processing of your personal data in accordance with the LastPass Privacy Policy. You can unsubscribe from marketing communications at any time.

Cover Image for “Well, We Had a Good Run”: Thinking About Cyber Threats in the Age of AI, Part 2: Threats TO AI
Threat Intel
“Well, We Had a Good Run”: Thinking About Cyber Threats in the Age of AI, Part 2: Threats TO AI
May 04, 2026 • By Mike Kosak
Cover Image for Removing the First Barrier to Secure Access: LastPass Mobile Smart Scanner
Product Updates
Removing the First Barrier to Secure Access: LastPass Mobile Smart Scanner
May 04, 2026 • By Shireen Stephenson
Cover Image for When AI Finds Every Vulnerability: Why Identity-First Security Matters in the Mythos Era (2026)
News & Insights
When AI Finds Every Vulnerability: Why Identity-First Security Matters in the Mythos Era (2026)
May 01, 2026 • By Shireen Stephenson
Cover Image for Browser Based Credential Attacks: How Modern Identity Security Stops the Newest Variants (2026)
Cybersecurity
Browser Based Credential Attacks: How Modern Identity Security Stops the Newest Variants (2026)
April 29, 2026 • By Shireen Stephenson
Cover Image for How AI-powered Infostealers are Rewriting the Playbook on Credential Theft (2026)
Cybersecurity
How AI-powered Infostealers are Rewriting the Playbook on Credential Theft (2026)
April 28, 2026 • By Shireen Stephenson
Cover Image for The 5 Best 1Password Alternatives for Small to Midsize Businesses: 2026 Comparison Guide
The 5 Best 1Password Alternatives for Small to Midsize Businesses: 2026 Comparison Guide
April 27, 2026 • By Shireen Stephenson
Cover Image for How to Ensure AI Access Security for Your Next SOC 2 Audit
Cybersecurity
How to Ensure AI Access Security for Your Next SOC 2 Audit
April 24, 2026 • By Shireen Stephenson
Cover Image for Customer Q&A: How a Distributed Analysis Firm Secured Access for a Remote-First Team
News & Insights
Customer Q&A: How a Distributed Analysis Firm Secured Access for a Remote-First Team
April 24, 2026 • By Becca Gage
Cover Image for Inside the shadows: The new SaaS security risks of Shadow AI in 2026
Cybersecurity
Inside the shadows: The new SaaS security risks of Shadow AI in 2026
April 15, 2026 • By Shireen Stephenson