Proton has established itself quite successfully in the world of security products. You may have heard of its offerings in the encrypted email and VPN industries. Well, it also has a superb answer to the best password managers in the form of Proton Pass.
This handy password manager promises end-to-end encryption for all your passwords, ensuring your sensitive data remains secure even from Proton itself. It supports 2FA, encrypted notes, and even email alias generation - all packed into Proton's signature user-friendly interface. And just like all of Proton's offerings, its open-source and regularly audited by security experts.
But does Proton Pass live up to its reputation for privacy and ease of use? With competition from established players, can a relatively new password manager carve out a space for itself? Let's take a look.
Proton Pass: Plans and pricing(Image credit: Proton Pass)Proton Pass offers a range of pricing options to suit different needs. The Free plan provides a solid foundation with unlimited passwords, support for passkeys, and two vaults, all protected by end-to-end encryption. For users seeking enhanced privacy and convenience, the Plus plan, priced at $2.99/month with an annual subscription, unlocks access to the Proton Sentinel service, unlimited hide-my-email aliases and premium support.
The Proton Pass Family plan is $4.99 per month, when paid for a year, and it allows up to six people to experience everything the Proton Pass Plus offers.
Those who want a comprehensive suite of privacy tools can opt for Proton Unlimited at $9.99/month with an annual subscription, which includes all Proton services like Mail, VPN, Drive, Calendar, and Pass.
(Image credit: Proton Pass)The Business plans start with Pass Essential that costs $1.99/user/month when paid for a year (yearly total $23.88/user). It includes all the essential password management features such as the ability to store unlimited passwords, passkeys, notes, and credit card details, a built-in 2FA authenticator, and unlimited email aliases.
For larger organizations that need support for single sign-on (SSO), and detailed activity logs, there’s Pass Professional that costs $4.49/user/month with an annual subscription (yearly total $53.88/user). You’ll have to pay for a minimum of three seats for both Pass Essential and Pass Professional plans.
(Image credit: Proton)Proton Pass: SetupHere’s an overview of how to set up Proton Pass.
First and foremost, it's important to have a Proton account. If you still need to create one, visit the Proton website and sign up for an account. Once you've registered and verified your credentials, you'll need to enable two-factor authentication (2FA), which is where Proton Pass comes into play. Two-factor authentication adds a level of security by requiring your password and a unique code that you can access only at the time of login.
To set up 2FA and Proton Pass, log in to your Proton account and navigate to the security settings page. Here, you will find the option to enable two-factor authentication. Click on it, and you'll be prompted to download a two-factor authentication app if you haven't already. Proton recommends using an authenticator app like Google Authenticator, Authy, or FreeOTP, which you can download from your mobile app store.
After installing the authenticator app on your smartphone or tablet, the next step is to link it to your Proton account. Within the Proton security settings, a QR code will appear on the screen. Open your authenticator app and use its 'Scan QR code' feature to scan this code. This will automatically add your Proton account to the app and generate timed, one-time passcodes.
The Proton security settings page will also provide you with a recovery code. Writing this down or printing it and keeping it somewhere safe is crucial. This code is a lifeline for instances where you might lose access to your second-factor device. With your authenticator app now synced, your Proton Pass is effectively set up. When you log in to your Proton account, you will enter your password and the unique code displayed in your authenticator app.
(Image credit: Proton)Proton Pass: Interface and performanceThe Proton Pass interface is a masterclass in minimalist design, reflecting Proton's philosophy of providing simple yet powerful security solutions. Activating two-factor authentication (2FA) for your Proton account reveals a clean and intuitive dashboard that seamlessly blends user-friendliness with robust security.
Navigating to 2FA settings is effortless, with clear instructions and visuals guiding you through the setup process. The prominent display of the QR code for your authentication app ensures quick and easy account linking. Proton Pass excels in its handling of the recovery code, prominently showcasing it during setup and stressing its importance for account recovery. This thoughtful design prioritizes user understanding and preparedness.
Once set up, using Proton Pass becomes second nature. The login process is streamlined, requiring your password and 2FA code in a clear, two-step sequence. Input fields are unambiguously labeled and positioned for a frictionless experience. This commitment to simplicity extends throughout the interface, minimizing distractions and cognitive load to ensure a smooth and efficient authentication process.
The aesthetic minimalism of Proton Pass isn't just about visual appeal; it's a deliberate strategy to enhance usability and encourage secure practices. By prioritizing clarity and ease of use, Proton Pass empowers users to take control of their online security without unnecessary complexity.
(Image credit: Proton)Proton Pass: SecurityProton Pass takes a multi-layered approach to security, aiming to protect your passwords and sensitive data with the strongest possible safeguards:
End-to-End Encryption: This is the cornerstone of Proton Pass's security. All your data, including passwords, usernames, notes, and even website addresses and metadata, is encrypted on your device before it's sent to Proton's servers. This means that no one, not even Proton themselves, can access your information in its unencrypted form.
Zero-Knowledge Architecture: Proton Pass operates on a zero-knowledge principle. This means that your encryption keys are generated and stored only on your device. Proton has no access to these keys, further ensuring that they cannot decrypt your data.
Strong Encryption Algorithms: Proton Pass uses both asymmetric and symmetric encryption algorithms to secure your data, including AES256 and OpenPGP. These are industry-standard algorithms known for their resilience against brute-force attacks and other security threats. Proton Pass also encrypts stored passkeys using Curve25519.
Open Source: Much of Proton Pass's code is open source, allowing security researchers and the community to audit it for vulnerabilities. This transparency helps ensure the integrity and security of the software.
Two-Factor Authentication (2FA): Proton Pass supports 2FA, adding an extra layer of security to your account. This requires a unique code from your authentication app in addition to your password when logging in, making it much harder for unauthorized access. As an additional bonus, Proton Pass also offers an in-app authenticator and will let you know when 2FA can be enabled on any of your stored accounts.
Password Generator: Proton Pass includes a strong password generator that can create complex, unique passwords for each of your accounts, reducing the risk of password reuse and vulnerability to breaches.
Breach & Dark Web Monitoring: Proton Pass can monitor your accounts for data breaches and alert you if your information is compromised. This allows you to take immediate action to protect your accounts.
Proton Sentinel: For users in need of extra protection, Proton Pass also offers protection from it's Proton Sentinel high-security program which includes additional security protections, enhanced visibility into security logs, 24/7 suspicious login monitoring using both AI and human detections, and automatic security specialist referral for all account security support requests.
Hide-my-email Alias: Proton Pass also makes your email more secure by offering a fully integrated email masking tool that allows you to customize your masked domain and alias, and allows you to forward mail that is sent to your masked email to multiple inboxes.
Secure sharing: Outside of secure sharing with other Proton users, you can securely share vaults, links, and files with non-Proton users.
Secure payments: Proton Pass will let you securely store an unlimited amount of credit cards.
In summary, Proton Pass employs a comprehensive suite of security measures to safeguard your sensitive information. Its focus on end-to-end encryption, zero-knowledge architecture, and open-source practices makes it a highly secure choice for password management.
Proton Pass Business: Team and Admin FeaturesProton Pass Business offers adequate team management and administrative capabilities.
As is the norm for such offerings, Proton Pass Business offers a web-based centralized admin console for managing users, controlling permissions, and monitoring password health, and user activity.
Your users can use the platform to create organization-wide, or department, and team-specific vaults to share credentials, and other secure data. Users can share the vault with other users in the same team or department, with granular access permissions.
By default, the invited users can only view the items in a vault, but they can also be given Edit permissions to create, delete, and export items in the vault, or Manage permissions to grant, and revoke access to a vault to other members.
As an admin, you can prevent users from sharing vaults with others who aren’t part of your organization. In addition to vaults, you can also prevent your users from sharing individual items, and stop them from exporting their data as well.
If you do allow sharing of individual items, your users can share passwords, and other sensitive information, such as secured notes, with their colleagues.
They can also share these with anyone, even if they don’t use Proton Pass, with Secure Links. The feature helps create unique, expirable links to your login credentials, secure notes, and other items. You can set the expiration date from anywhere between one hour up to 30 days, and even restrict the number of times the recipient can access the link (from one to as many).
That said, you can’t control which devices can access company vaults. Neither can you restrict access by IP address.
You can use Proton Pass Business to define password policies. The platform gives you the ability to enforce password complexity requirements, including the ability to customize minimum and maximum password length, and whether they should include numbers, special characters, and uppercase characters.
(Image credit: Proton Pass)One interesting option is the ability to ask the platform to help your users generate memorable passwords. That said, unlike some of its peers, the platform doesn’t allow admins to enforce a password rotation policy on its users.
Another strong security feature is the ability to require all your users to use 2FA. If you don’t want to force this upon them, you do have the option to gently remind them (via email) to enable 2FA on their own.
(Image credit: Proton Pass)The platform also lets admins forcefully logout users after the expiry of a configurable idle period, which can range from one minute to one hour. Here too we miss a failed login attempt feature that you get with some of its peers, which locks accounts after detecting suspicious activity, like a number of failed logins.
(Image credit: Proton Pass)Talking of suspicious activity, Proton Pass Business gives users access to a Pass Monitor feature that monitors the dark web for leaked passwords, and more. Business users are also enrolled in the Proton Sentinel program, which helps detect and stop unauthorized attempts to break into your account, even if the attackers have the correct password.
Finally, the platform offers detailed activity logs that help give visibility over all kinds of user activity, such as any changes made to passwords and vaults. The platform is pretty comprehensive in its logging, and tracks about two dozen events, for everything from invitations, and vaults, to individual items, and secure links.
Proton Pass Business: Integrations and CompatibilityProton Pass works across platforms, and offers native apps for all the popular desktop and mobile operating systems, namely Windows, macOS, Linux, Android, and iOS. It also offers extensions for the best web browsers including Chrome, Brave, Firefox, Safari, and Edge.
Proton Pass can import passwords from any of these browsers, as well as from the best password managers including 1Password, Bitwarden, Dashlane, Keeper, NordPass, RoboForm, and others.
If you are a Pass Professional user, you also get support for SSO and SCIM integration. Proton Pass Business plugs into all the mainstream identity providers (IdPs) like Microsoft Entra ID, Okta, and Google Workspace to streamline user lifecycle management.
Finally, as we have mentioned earlier, Proton Pass is also deeply integrated into the Proton ecosystem of services, including Proton Mail and Calendar, Proton Drive, Proton VPN, and Proton Wallet. As an admin you can control which of these services can users in your organization access.
Proton Pass Business: Ease of Use and DeploymentThe admin panel of Proton Pass Business is clean, and fairly intuitive.
The first order of business is user provisioning, and the platform offers adequate options to help admins add (and later remove) team members.
(Image credit: Proton Pass)Admins can invite members by sending them an email. You can also directly create a password for them, instead of sending them an invite, and then share the password with them using other secure means. The platform also offers bulk user import through CSV files.
In the same vein, the process of enabling SSO for the supported IdPs is also fairly intuitive, and is well documented. Once added, you can give admin privileges to other users, although only the primary admin can edit the plan of the organization.
Admins can track the activity of their users through the Reports section. It offers a Pass Monitor report that tells you the number of reused, weak passwords, if the passwords were found in any breach, and other details, for every user. Then there’s the Usage report that tells you the total number of items a user has access to, the number of vaults they own, and have access to, and other details, again for every user.
Finally, there’s the Activity Logs section that logs all user events along with their time, the user account that it happened on, the type of event, and the IP address the activity originated from.
You can filter the logs by email or IP address, event type, and date range. You can also click on a time or event entry to filter by that timestamp or event type. Both the reports, and the activity logs can also be exported as a CSV file.
Proton Pass: Customer support(Image credit: Proton)Like any other company, Proton has a wealth of online guides to help you set things up and carry out basic troubleshooting and other issues. There are also helpful tabs on the latest Proton Pass updates and guides to enhancing personal privacy.
Getting in touch is easier than with some bigger companies, as there’s a clear form that’s easy to find, though responses will be by email rather than live chat. As more Internet users begin to question and value their privacy, turning to Proton and other security-focused products, we can only hope that the company invests in multi-channel support, be it live chat, social media support, or a phone number. Fortunately, it looks like all customers, free or paid, are treated equally.
Proton Pass: The competitionProton Pass is not short of competition, and frankly the password management market is fairly saturated. However, Proton's open-source basis and wealth of security tools and features make it a very strong contender.
It's rivals include the likes of NordPass, which offers more competitive pricing with a similar feature set. For business oriented customers, 1Password is slightly more expensive but offers 24/7 support, however a business looking for a dedicated suite of secure business products may benefit from signing up to the full Proton Business Suite to access Mail, Calendar, VPN, Pass, and Drive for just a few extra dollars per user per month.
Proton Pass: Final verdictProton Pass simplifies strong security with its intuitive two-factor authentication (2FA) interface. Setting up 2FA is a breeze, thanks to clear instructions, a streamlined recovery process, and an uncluttered dashboard. While Proton Pass makes robust cybersecurity accessible to everyone, deciding whether to use it depends on your specific needs.
If you regularly handle sensitive information, Proton Pass provides a significant security boost, protecting your account from potential breaches. However, if you rarely deal with sensitive data or find 2FA workflows disruptive, alternative security measures might be sufficient.
Ultimately, choosing Proton Pass is about your commitment to online security. It's an extra step in your authentication process, but one that significantly strengthens your defenses and protects your digital identity.
We've also featured the best business password managers.
What to look for in a password managerChoosing a password manager is a crucial step towards safeguarding your digital life. With so many options available, it's essential to prioritize features that guarantee both security and a seamless user experience. Here's a breakdown of key factors to consider:
Security is Paramount:
Robust Encryption: Look for a password manager that employs industry-leading encryption standards like AES-256. This ensures your sensitive data remains unreadable even if a breach occurs.
Zero-Knowledge Architecture: Prioritize providers who utilize a zero-knowledge model, meaning they cannot access your encrypted data or master password. This puts you in complete control of your information.
Two-Factor Authentication (2FA): Enable 2FA for an added layer of security. This requires a unique code from your authentication app in addition to your master password, making it significantly harder for unauthorized access.
Open-Source Options: Consider open-source password managers. Their transparent code allows for community scrutiny and independent security audits, ensuring higher trustworthiness.
Usability Matters:
Intuitive Interface: A user-friendly interface is essential for effortless password management. Look for features like easy navigation, clear organization, and a straightforward password generation process.
Cross-Platform Compatibility: Ensure the password manager seamlessly integrates across your devices (desktops, laptops, smartphones, tablets) and various operating systems (Windows, macOS, iOS, Android).
Auto-fill and Password Generation: These features streamline your online experience. Auto-fill automatically populates login credentials, while the password generator creates strong, unique passwords for each account.
Beyond the Basics:
Password Health Check: A good password manager should assess your existing passwords for strength and identify any weak or reused ones, helping you improve your overall security posture.
Breach Monitoring: Some password managers offer breach monitoring, alerting you if your credentials are compromised in a data breach. This allows for swift action to secure your accounts.
Secure Sharing: If you need to share passwords with family or colleagues, look for secure sharing features that maintain encryption and control over access.
Provider Reputation and Support:
Reliable Customer Service: Choose a provider with responsive customer support to assist you with any issues or questions.
Regular Updates: Frequent updates demonstrate the provider's commitment to security and addressing potential vulnerabilities.
By thoroughly evaluating these factors, you can select a password manager that not only protects your digital identity but also simplifies your online experience. Remember, a good password manager is an investment in your online security and peace of mind.
After the mother of all hattricks, Ted Lasso season 4 is officially underway, according to a new teaser from Apple TV+. In the clip (see below), Jason Sudeikis (Ted Lasso), Hannah Waddingham (Rebecca Welton), Juno Temple (Keeley Jones) and Jeremy Swift (Leslie Higgins) are reunited, with a scene filmed in Sudeikis’ hometown of Kansas City, suggesting a huge location change from Richmond will be featured in the next installment. However, the scene is cut off before things can really get going, so what’s actually happening is anybody’s guess.
Also up in the air is the eventual season 4 release date, alongside whether other core cast members will be returning. Phil Dunster (Jamie Tartt), Nick Mohammed (Nathan 'Nate' Shelley), Sarah Niles (Dr Sharon M Fieldstone), Anthony Head (Rupert Mannion), Toheeb Jimoh (Samuel 'Sam' Obisanya), Cristo Fernández ( Dani Rojas), Kola Bokinni (Isaac McAdoo), Billy Harris ( Colin Hughes) and James Lance (Trent Crimm) are yet to be confirmed for a Ted Lasso return, and we likely won’t be finding out if they are until much closer to the hit Apple TV+ show’s eventual release (or at least with enough time passed that a full season 4 trailer can be released).
You might have noticed one name missing from the above list, and that’s for good reason. Even though they don’t appear in the Ted Lasso season 4 production teaser, we know they’ve been promoted to series regular… and been swiftly recast in the process.
The main gang is back together in Apple TV+’s Ted Lasso season 4 teaser, but the same can’t be said for HenryI’m talking about Henry, who is Ted Lasso’s son in previous seasons. He was originally played by Gus Turner, but instead of Turner returning for the role, Obi-Wan’s Grant Feely has taken over. Back in March 2025, sources claimed (via The Independent) that the show was looking to recast Henry in order to use an actor who was “proficient in soccer,” meaning we’re likely to see Henry on the pitch even more in upcoming episodes. Deadline has also confirmed Henry is now a series regular as of season 4, appearing more infrequently across seasons 1-3.
Of course, this isn’t the only on-pitch change we’ll expect to see in season 4. Ted will now be coaching AFC Richmond women’s football team, with stars like Tanya Reynolds (Sex Education), Jude Mack (Back in Action), Faye Marsay (Adolescence), Rex Hayes, Aisling Sharkey (Jurassic World: Dominion) and Abbie Hern (My Lady Jane) tipped to take on the role of new players. Currently, all we know is that these new faces are definitely onboard in some capacity.
If you watched Ted Lasso season 3, you’ll remember we left off with everything pretty wrapped up, and it felt as though all of our key players were skipping off to the horizon with their happy endings. Ted didn’t give up on coaching, entirely, instead coaching Henry's soccer team after moving back to Kansas City. AFC Richmond beat their rival while placing second overall in the league, with Rebecca revealing she is selling the club. Apple TV+ has so far confirmed the following plot for season 4: “Ted returns to Richmond, taking on his biggest challenge yet: coaching a second division women’s football team. Throughout the course of the season, Ted and the team learn to leap before they look, taking chances they never thought they would.”
How this actually happens after that finite season 3 ending remains a mystery, but if it means Lasso and the gang are reunited in Richmond, then get me back pitchside.
You might also likeTesla has officially opened the doors to its retro-futuristic drive-in diner, which is situated on Santa Monica Boulevard in Los Angeles and doubles as a charging destination and hip hangout.
First announced by CEO Elon Musk back in 2018, the project only broke ground two years ago, with very little information in the meantime on exactly what it would entail.
But, unlike some of Tesla’s other projects, this one appears to have over-delivered on its promise.
The large corner plot houses 80 V4 Supercharger stalls that are open to any electric vehicles with the North American Charging Standard (NACS) port, while solar canopies offer shade to drivers and provide power to the charging points and site.
There’s also a 24/7 diner, complete with an upper lever Skypad for al fresco dining, serving burgers, fries, chicken wing, milkshakes and other classic all-American culinary delights. What’s more, Tesla owners can order via a bespoke Diner app from inside their vehicles and have the food delivered to their car.
Two, 66-foot LED “megascreens” play a rotation of modern and classic movies, which can be enjoyed from the Skypad or from inside the car for an authentic At the Drive-in experience, as a bespoke app syncs up the interior displays with whatever is going on outside.
According to Tesla, the menu has been curated by chef Eric Greenspan and restaurateur Bill Chait, but has been designed to mimic the offerings found in classic diners of yesterday. So think cheeseburgers, fries and shakes.
Of course, there's also a merch stand that sells everything from caps and T-shirts to "Supercharged Gummies". Oh, and the food is served in little Cybertruck-shaped boxes, which is cute.
Analysis: Exactly what the EV industry needs(Image credit: Tesla)Despite recent registration figures suggesting that EVs are slowly becoming more popular with buyers in the US, Europe and beyond, there is still a large sector of the public that remains on the fence – or just plain hates the technology.
Tesla’s Diner doesn’t really need to exist, but it’s exactly the sort of thing that proves electric vehicles can offer something a little different. The ability to simultaneously charge, eat and enjoy a movie certainly beats spilling gasoline all over your hands at a gas station.
Elon Musk has already suggested that he plans to roll out more sites if LA proves successful, while the likes of Rivian already has some of the coolest charging outposts in Joshua Tree and Yosemite.
Porsche and Mercedes-Benz are also expanding their charging lounges, which offer premium surroundings and good coffee to anyone that uses them.
It is a smart solution to the potential pain point of EV ownership – turning the negative of longer charging sessions into a positive experience.
It's also sensible to move electric vehicles on from the constant environmental messaging, CO2 reduction and sensible fuel savings rhetoric. Suggesting they can also be fun is a clever way to persuade an indecisive audience and the next generation.
You might also like- Releases in theaters worldwide on July 25
- Main trailers revealed in February, April, and July
- Main cast confirmed in February 2024
- One actor cut from the film version of the film
- Story synopsis revealed
- Takes place in a parallel universe to the MCU
- Other plot details teased
- Will directly lead into the events of Avengers: Doomsday
The Fantastic Four: First Steps is almost here. The third big-screen reboot for Marvel's First Family takes flight worldwide on July 25, so you've still got time to learn what we know so far before you watch it.
Below, I've rounded up the latest and biggest news about the final Marvel Cinematic Universe (MCU) movie of 2025. That includes more details about its cast, plot, trailers, and the future of The Fantastic Four in the MCU itself.
Full spoilers follow for Thunderbolts*. Potential spoilers for The Fantastic Four: First Steps also follow, so proceed with caution.
The Fantastic Four: First Steps release dateA post shared by Fantastic Four (@fantasticfour)
A photo posted by on
As mentioned, The Fantastic Four: First Steps lands in theaters on Friday, July 25. It was originally due out last November, but Marvel revised the launch date of its Fantastic Four movie last February.
The Fantastic Four: First Steps trailerMarvel unveiled The Fantastic Four: First Steps trailer in early February, and it revealed official looks at Marvel's iconic quartet of superheroes, the movie's Big Bad in Galactus, and John Malkovich's mysterious character who's since been cut from the film (more on that later).
Two months later, Marvel debuted First Steps' official trailer, which revealed first looks at Reed Richards' stretchy powers, The Silver Surfer, and other Galactus-sized teases. It contained footage first presented at CinemaCon 2025, with both trailers confirming a big fan theory about Sue Storm. I'll explain more about that in this article's plot section later on.
Another trailer for The Fantastic Four: First Steps, which confirmed two of the movie's worst-kept secrets, was released in June before Marvel unveiled First Steps' final trailer that raised my fears about the fate of one of the iconic quartet in early July. Watch it below:
The Fantastic Four: First Steps cast: confirmed and rumoredFirst Steps' primary cast was finally revealed in February 2024 (Image credit: Marvel Studios)Here's the confirmed cast for Marvel's latest Fantastic Four movie reboot. You can learn more about them in my dedicated First Steps cast and character guide, too:
Ahead of the first four actors' official unveiling as the titular team, there were an avalanche of casting rumors that sent MCU fans into a tailspin. However, Moss-Bachrach has since told The Jimmy Kimmel Show that he officially signed on in August 2023. One month earlier, Kirby told TechRadar "it would be an honor" to play Sue Storm, which all but confirmed her hiring.
Pascal reportedly held talks with Marvel about joining the cast in November 2023. Then, a February 2024 report revealed Pascal had signed on to play Richards, so the sting was taken out of that surprise. The only shock reveal was Quinn's, with the Stranger Things actor announced as Johnny Storm last February.
Galactus' full reveal is being withheld until the film is released globally (Image credit: Marvel Studios)On the villain front, The Office UK's Ralph Ineson voicing Galactus, aka the movie's villain-in-chief and a regular foe of Marvel's First Family. Ineson will be joined on antagonistic duties by Ozark's Garner, who'll play a gender-swapped version of the Silver Surfer, aka the Herald of Galactus. Incidentally, Ineson and Garner never filmed a scene together and only actually met once while on First Steps' set.
Meanwhile, Hauser, Niles, and Gatiss were later revealed as part of the cast, as was Lyonne. Initially, Marvel fans thought Lyonne would be perfect for a very specific role, but she isn't playing the character many of us expected.
Another actor who was set to appear was John Malkovich. He was expected to play another Fantastic Four adversary called Red Ghost, but director Matt Shakman told Variety that, much to Shakman's disappointment, this villain had to be cut from the final edit.
Robert Downey Jr is back in the MCU, but not as Tony Stark/Iron Man (Image credit: Walt Disney Studios/Marvel Studios)And what of Doctor Doom, another of the team's legendary villains and one of Marvel's most iconic villains? With none other than Robert Downey Jr – yes, he of Iron Man and Avengers fame – playing Doom, who is now the Multiverse Saga's new main villain, he should cameo, right?
For starters, Shakman told TechRadar that, regardless of whether Downey Jr would play him or not, Doom was never considered as First Steps' primary villain.
Speaking to Empire magazine (as reported by comicbookmovie.com), Shakman also denied Downey Jr will appear in this movie, saying Doom isn't "part of my purview".
However, Shakman has since said (per ScreenRant) that Avengers: Doomsday directors Joe and Anthony Russo shot this film's post-credits scene. The pair are also credited with shooting Thunderbolts' post-credits scene, which ties into First Steps' plot. So, it's all but confirmed – in my mind, anyway – that Doom will show up before the screen cuts to black for the final time.
The Fantastic Four: First Steps story synopsis and speculationSue Storm and company will already possess superhuman abilities at the start of the film (Image credit: Marvel Studios)Here's The Fantastic Four: First Steps' official story brief: "Set against the vibrant backdrop of a 1960s-inspired, retro-futuristic world, The Fantastic Four: First Steps introduces Marvel’s First Family... as they face their most daunting challenge yet.
"Forced to balance their roles as heroes with the strength of their family bond, they must defend Earth from a ravenous space god called Galactus and his enigmatic Herald, Silver Surfer. And, if Galactus’ plan to devour the entire planet and everyone on it weren’t bad enough, it suddenly gets very personal."
The first thing to note about this Marvel Phase 6 project is it isn't an origins story. Other Fantastic Four films have already covered their cosmic radiation-based superpowered beginnings in a live-action capacity, so don't expect this movie to re-tread old ground.
If you're concerned about watching it with little to no knowledge of the titular team, don't fret. Marvel has released a First Steps prequel comic book that'll explain how the quartet acquire their superhuman abilities, the universe they inhabit, and more. So, be sure to pick up a copy if you need to.
Reed Richards and the rest of the eponymous superteam exist in an alternate reality to the MCU (Image credit: Marvel Studios)First Steps will not only be a period piece, but is also set in a parallel universe, which has since been confirmed as Earth-828.
That much was made clear in the movie's first official artwork (see the X/Twitter post above), which depicted a different New York to the one we're used to seeing in the MCU. Given it's set in an alternate reality, you won't have to watch any other Marvel projects because it's genuinely a standalone story. Indeed, Shakman told TechRadar that fans new and old won't have to do any MCU homework to enjoy First Steps. Phew!
Anyway, fans have long predicted that The Fantastic Four will eventually cross over into the MCU (designated Earth-616 by Marvel) as part of the ongoing Multiverse Saga. The aforementioned artwork, trailer, and the first poster for Marvel's new Fantastic Four movie poster suggested this would be the case, but Thunderbolts' end credits scene practically confirmed this would happen. For more details, read my Thunderbolts* ending explained article.
"What time is it, Ben!?" (Image credit: Marvel Studios)There have been plenty more hints about the film's narrative in the run-up to release.
For one, Marvel teased some key story details about The Fantastic Four: First Steps in April 2024 by making some iconic Fantastic Four comic books available to download and read for free. Those literary works feature Galactus and The Silver Surfer, so Shakman and company have taken plenty of storytelling inspiration from them.
Then there's the big fan theory about Sue Storm that was proven correct by First Steps' second trailer – that being, Sue and Reed will welcome their first child, Franklin Richards, during this movie.
If online speculation is to be believed, he'll be an important part of the plot, which would tie into the "personal" element of First Steps' story synopsis. That rumor was part of a major plot leak that The Fantastic Four: First Steps suffered in late May – but, don't worry, you won't find any major spoilers here or the previously linked-to article.
Franklin (center) will play a large role in First Steps, according to industry leakers (Image credit: Marvel Studios)Regardless, The Fantastic Four's latest silver screen outing will lean heavily into the familial aspect that's made them such an iconic group in Marvel's library of superheroes.
Indeed, Shakman and the film's main cast have stressed the importance of examining the team's familial dynamics in separate chats with Entertainment Weekly and Collider. Whether it's Sue and Johnny's sibling bond, Sue and Reed's marriage, Reed and Ben's friendship, or the changes that come following Franklin's birth, one of The Fantastic Four's enduring themes will be explored at length in First Steps.
Where can I watch the previous Fantastic Four films?Don't upset The Silver Surfer – tell her where you can watch The Fantastic Four's other films, quick! (Image credit: Marvel Studios)You can stream 2005's Fantastic Four, 2007's Fantastic Four: Rise of the Silver Surfer, and 2015's Fantastic Four on Disney+ no matter where you live. As long as you're subscribed to one of the world's best streaming services, you can watch it whatever region of the world you dwell in.
How will The Fantastic Four impact the MCU?Avengers: Doomsday began filming in April 2025 (Image credit: Marvel Studios)The short answer is: we don't have a complete picture yet.
The group will become part of the MCU after The Fantastic Four: First Steps because they'll have a big role to play in Avengers: Doomsday. Pascal, Kirby, Quinn, and Moss-Bachrach were announced as part of Doomsday's initial 27-strong cast in late March. Throw in their spaceship-based appearance in the MCU in Thunderbolts' post-credits scene, plus Doom's likely cameo in one of First Steps' own end credits stingers, and Doomsday and its sequel Avengers: Secret Wars will be heavily impacted by the eponymous team's MCU debut.
That won't be the last time we see them, either. The Fantastic Four: First Steps is reportedly getting a sequel, though it's unclear when work will begin on it or how it'll fit into Marvel Studios' post-Secret Wars plan, which Marvel President Kevin Feige has already referred to as a soft reboot of the cinematic juggernaut (per Variety).
As for potential First Steps spin-offs, a Silver Surfer TV show was reportedly in development for Disney+. We've heard little about this possible project since, so nobody knows if it'll see the light of day. In short: keep your eyes trained on TechRadar for news on all of the above once we know more.
For more Marvel-based coverage, find out how to watch the Marvel movies in order. Alternatively, read more about Spider-Man: Brand New Day, see if you agree with my ranking of the best Marvel movies, or get the lowdown on Daredevil: Born Again season 2.
NPR newsroom chief Edith Chapin says she's leaving the network. She made the announcement just days after Congress voted to strip public broadcasting of all federal funding.
(Image credit: Stephen Voss)
Global fashion powerhouse Dior has begin sending out data breach notification letters to customers impacted by a January 2025 cyberattack.
The outlined to customers what happened, what kind of data was taken, and what it did to contain the incident.
It also offered free identity theft and credit monitoring services for 24 months, through Experian Identity Works SM credit monitoring.
Korean and Chinese targetsThe incident occurred on January 26, 2025, but was only discovered on May 7. Dior responded by notifying the police, and bringing in third-party experts to assess the situation.
The analysts determined the threat actors accessed a database containing customer information, including full names, contact information, postal addresses, dates of birth, passport and government ID numbers, and Social Security numbers (SSN).
The combination of information stolen varies from person to person, but Dior stressed that payment information, including bank account or payment card information, was not stolen since it wasn’t in the database to begin with.
In response to the attack, the company “enhanced network security” without going into further details.
Unfortunately, the damage was already done, and the attackers now have plenty of information to use in targeted attacks. Information such as names, email addresses, dates of birth, and government ID information, can be used to create customized, convincing phishing attacks, especially since the attackers know the victims are Dior customers.
Dior knows this too, which is why in the letter it also recommends users “remain vigilant for incidents of fraud and identity theft”.
“We also recommend that you continue to review your financial accounts, account statements, and free credit reports for any suspicious activity.”
This seems to have been an international incident, since at least Korean and Chinese customers seem to have been impacted. In South Korea, Dior could be facing a lawsuit for not properly notifying relevant authorities. Currently, no threat actors have claimed responsibility for the attack, and the stolen data has not emerged on the dark web.
Via BleepingComputer
You might also likeMarks & Spencer did the right thing by self-reporting its recent cybersecurity incident to the Information Commissioner’s Office (ICO) and the National Cyber Security Centre (NCSC). That kind of transparency is essential, not just for managing reputational risk, but for limiting regulatory fallout.
Under UK GDPR, failing to protect personal data or report breaches promptly can lead to fines of up to £17.5 million, or 4% of global turnover. And if M&S handles EU customer data, it may also come under the scope of the EU’s NIS2 Directive, which can carry penalties of up to €10 million.
But let’s be clear, regulatory exposure is just one piece of the puzzle. The real test is how quickly and transparently an organization responds, and whether it had strong cyber resilience measures in place before the breach.
A complex attackAt SonicWall, we saw that in 2024, organizations under critical attack remained in crisis mode for an average of 68 days. These aren’t smash-and-grab attacks, they’re persistent, they’re sophisticated, and they leave lasting damage. In M&S’s case, the attack has already caused weeks of disruption and knocked an estimated £700 million off its market value alongside an eye-watering £300m hit to profits.
Unfortunately, this isn’t an outlier. It reflects a broader trend we’ve tracked in our for quite some time: cyberattacks are becoming faster, smarter, and more aggressive. Threat actors are now exploiting newly disclosed vulnerabilities within 48 hours - far faster than most organization's patch management schedules. Retail is especially vulnerable, with its complex composable tech stacks, aging infrastructure, and inconsistent cyber hygiene.
Ransomware isn’t going anywhereThis incident also underscores a hard truth: ransomware is not going away. In fact, it’s thriving and becoming more accessible. A few years ago, attackers needed to write their own malicious code. Today, they can buy a ready-to-deploy ransomware kit for as little as $50 on the dark web.
Ransomware is uniquely damaging for retailers and any organization that provides direct, daily services. It doesn’t just steal data, it shuts down business operations. That makes it a powerful leverage tool for extortion. When every hour of downtime equals lost revenue, many victims feel pressure to pay just to resume operations.
And let’s not forget the broader ecosystem. Supply chain disruptions have already become a recurring issue over the past three years, driven by remote work, macroeconomic shocks, and increased digitization. A cyberattack at one point in the supply chain can ripple through others, compounding the impact. Organizations can’t afford to treat cybersecurity as someone else’s problem.
That’s why companies need to assume they will be targeted and build out layered defenses, clear incident response plans, and robust consumer notification processes. Regular training for employees on phishing, password management, and best practices must be a baseline. Regulators and industry groups should also push for greater transparency and enforceable standards to protect consumers and stakeholders from material damage when things go wrong.
Organizations are struggling to keep upWe’re in the middle of a perfect storm: rapid digitization, heavy third-party reliance, and the rise of financially motivated, well-organized cybercriminal groups. Retailers, in particular, offer a large and often soft target, their IT environments are sprawling, interdependent and identity management controls are frequently weak. That’s a recipe for disaster.
We saw this play out in both the M&S and Legal Aid Agency breaches, where attackers used identity-based tactics and advanced social engineering to get in and move laterally.
In many cases, a lot of businesses are still trying to protect yesterday’s IT infrastructure from yesterday’s threats. Whether it’s misconfigured Active Directory, third-party IT suppliers, poorly implemented MFA, or outdated detection tools, the gaps being exploited today show a much deeper issue, not just a tech gap, but a leadership and culture gap.
What needs to happen now?Sadly, it’s probably going to get worse before it gets better. Attackers are innovating faster than defenders can respond. That means organizations need to rethink their priorities, fast. The top of the list should include:
- Strengthening identity and access management
- Investing in real-time threat detection and response
- Reducing third-party and supply chain risk
- Embedding security into the culture, from the boardroom to the front lines
Cybersecurity isn’t just an IT problem anymore, it’s a core part of business resilience. Companies that can’t recover quickly from a cyberattack may not recover at all.
Cyber’s “big one”So what about that “big one” cyberattack people in the industry have warned about? It’s not just theory anymore. The tactics we’re seeing in retail and legal breaches, ransomware, credential theft, lateral movement, are exactly what could bring down critical infrastructure like healthcare, utilities, or government systems.
We haven’t seen a full-scale ‘black swan’ event in the UK yet. But if the current trajectory continues, it’s not a question of if, it’s when.
Unless we move faster and smarter across every sector, we risk being caught unprepared by a new generation of cyber threats that are already here.
We list the best internet security suites.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Nintendo has announced a brand new Switch 2 bundle off the back of July 22's Pokémon Presents showcase.
This Nintendo Switch 2 bundle packs in the console, as well as a digital copy of Pokémon Legends: Z-A - Nintendo Switch 2 Edition, which is set to launch on October 16, 2025.
The bundle will cost $499.99 in the US. No UK price has been revealed yet, but the bundle is confirmed for the region, and it's reasonable to expect it to cost £429.99 here - the same as the launch bundle featuring Mario Kart World.
A bundle featuring the Nintendo Switch 2 system and a full game download for the Pokémon Legends: Z-A – Nintendo Switch 2 Edition game will be available Oct 16!Pre-order here: https://t.co/8RpirCrPEM pic.twitter.com/Zf94QPO6FzJuly 22, 2025
Pre-orders are set to go live on July 23, 2025, and the bundle will ship the same day that Pokémon Legends: Z-A releases, on October 16. Pre-orders will be available at Nintendo's online store, as well as "select retailers." That likely includes Best Buy, Walmart, Target, and GameStop in the US, as well as Argos and Currys in the UK.
Pokémon Legends: Z-A is now the second game Nintendo has provided a Switch 2 bundle for. It's the standard console, so no fancy limited edition designs here. Much like Mario Kart World, it's also a digital copy. With that in mind, this may be a standard strategy for Nintendo going forward, and it's entirely possible we see Switch 2 bundles for future releases like Kirby Air Riders, Metroid Prime 4: Beyond, and potentially even third-party games like The Duskbloods.
You might also like...Good news South Park fans: Paramount has reportedly agreed to buy the global streaming rights for the hit show following its quiet removal from the platform last week.
According to The Los Angeles Times, undisclosed sources familiar with the matter confirmed that the deal has gone ahead, which means that South Park will be available to stream on Paramount+ for the first time in the US.
The publication also revealed that a potential co-licensing deal with HBO Max and its parent company Warner Bros. Discovery had been in discussion with the show's creators after an existing deal expired in June, but Paramount has gone it alone, "according to one of the knowledgeable sources".
So, if you're a South Park fan this is the perfect time to keep or get a Paramount+ subscription, as the deal arguably solidifies its place as one of the best streaming services.
What does this mean for the future of South Park?Due to negotiations, the premiere of South Park season 27 has been delayed and has left fans feeling frustrated. Its original July 9 premiere date has been pushed back to July 23, which was confirmed in a social media post via the official South Park account (see below).
South Park’s 27th season premiere has moved to Wednesday, July 23rd at 10:00pm ET/PT on Comedy Central. pic.twitter.com/Ep2C28HXFSJuly 2, 2025
It is believed that the season premiere of South Park will be on Comedy Central as well as Paramount+, but the creators haven't been happy with the constant changes and described the process as a "sh***show" in another social media post.
At the time of writing, the original South Park series is still not available on Paramount+ in the United Kingdom, whereas some of the South Park specials like South Park: Joining the Panderverse are. It's a similar story in Australia as the original series is on 10, while the same South Park: Joining the Panderverse is on Paramount+.
If this deal is indeed accurate, it does mean that South Park will be moving to Paramount+, so hopefully global audiences will see the full show back in their streaming libraries very soon. Meanwhile, we'll hopefully get to call South Park one of our best Paramount+ shows again for US audiences.
You might also likeBitwarden takes a different approach from most of the best password manager tools because it is released under an open-source license.
Bitwarden's open-source status doesn't mean that, either. That designation means people can view, access, and contribute to the app's development. When you want an app to be secure and transparent about how it works, that can only bode well for its effectiveness.
There's more to like about this app than its open-source status. Bitwarden promises easy, robust security within minutes, unlimited password and device support, and secure, encrypted sharing.
Bitwarden is known for its open-source nature, one of its greatest strengths. This means that anyone can review its codebase for security vulnerabilities, ensuring a transparent approach to security.
To secure your data, Bitwarden uses end-to-end encryption, strong encryption, salted hashing, and PBKDF2 SHA-256. This ensures that your data is encrypted and decrypted locally on your device, meaning that not even Bitwarden can access your passwords.
It is compatible with various devices and platforms, including Windows, macOS, Linux, Android, iOS, browser extensions, and a web interface, making passwords accessible from anywhere.
Bitwarden offers a generous free tier and reasonably priced premium options. The premium plan is competitively priced and allows individuals and businesses to access advanced features like two-factor authentication.
Bitwarden comes with essential features such as secure password sharing, a security dashboard for password health, and the ability to store sensitive data securely.
For organizations, Bitwarden provides team and enterprise plans that include user management, directory sync, event logs, and enterprise policies for added security and administrative control.
Some drawbacks of Bitwarden include:
Need more advice on passwords? Then look no further than our reviews of the best password managers. And if you need some help with images, look at our coverage of the best password recovery software.
Bitwarden: Plans and pricingBitwarden’s business and personal plans are packed with features and are affordable (Image credit: Bitwarden)When looking at Bitwarden's pricing model, it's evident that they have designed it to cater to a wide range of users, from individuals to large enterprises. Bitwarden offers several tiers, which are extensively outlined on their official pricing page.
The free tier provides a robust feature set that includes unlimited password storage and syncing across all devices, making it an excellent starting point for individual users.
For those seeking enhanced capabilities, Bitwarden offers a premium tier priced at just $10 per year, adding features like advanced two-factor authentication and emergency access. Family packages are available for just $40 per year for up to six people.
(Image credit: Bitwarden)For businesses, Bitwarden categorizes its offerings into Teams and Enterprise plans. The Teams option starts at $4 per user per month, which includes everything in the Premium plan along with essential capabilities such as user management and event logs crucial for small to medium-sized teams. The Enterprise plan, tailored for larger organizations, offers additional advanced features such as Single Sign-On (SSO), directory synchronization, and custom branding. Enterprise pricing varies based on the required features and the scale of deployment, and interested users are encouraged to contact Bitwarden for a custom quote. For most users, the Enterprise plan is $6 per month for each user.
The flexibility of Bitwarden’s pricing not only makes it accessible for different types of users but also underscores its commitment to providing secure password management solutions across varying corporate needs and user bases. Whether you're an individual looking to bolster your personal cybersecurity or a large organization aiming to protect sensitive data, Bitwarden provides versatile and affordable options to fit the bill.
Bitwarden’s installation process is one of the simplest you’ll find. (Image credit: Bitwarden)Bitwarden: SetupHere’s a comprehensive guide on how businesses can set up Bitwarden to safeguard sensitive information effectively.
Bitwarden offers various plans tailored to meet different business needs. Companies can choose from the Teams or Enterprise plans depending on their size and requirements. The Teams plan is ideal for smaller businesses or teams within larger organizations that need essential user management and sharing capabilities. Larger organizations can benefit from the Enterprise plan, which includes advanced features such as Single Sign-On (SSO), directory sync, and custom branding options. Deciding the right plan is crucial as it impacts the features and capabilities available to the organization.
The next step is to set up an organization account once the plan is selected. This is a straightforward process:
Users can be added individually or in bulk through services like directory integration in the Enterprise plan, which supports syncing with directories like Microsoft Active Directory.
Bitwarden uses Collections to manage passwords and secure notes accessible to different users or groups within the organization. Setting up Collections ensures that sensitive data is only accessible to authorized personnel.
Here’s how to set up Collections:
To maximize security, Bitwarden allows businesses to implement custom security policies across the organization. These policies might include:
Implementing these policies helps in further safeguarding your business from potential cyber threats.
User training is essential to ensure that all team members understand how to use Bitwarden effectively and why robust password management practices are important. Training should cover:
Regularly auditing the use of Bitwarden within your organization is crucial to maintain security standards. This includes checking who has access to what data, ensuring that outdated or ex-employee access is revoked, and conducting periodic security reviews and updates of the tool itself.
All of Bitwarden’s features can be administered in the web application (Image credit: Bitwarden)Bitwarden: Interface and performanceBitwarden’s basic plans focus on the meat of password management, but even the free plans include multi-device sync, optional self-hosting, and unlimited cloud storage.
Premium plans include reports on your passwords that highlight weak passwords and unsecured websites. Also, advanced features are added, such as two-factor authentication (2FA) and emergency access. A Data Breach Report can tell you whether an email address has been compromised in a known data breach.
Bitwarden has a sleek, straightforward interface that allows users to easily search and access their passwords and secure data. And while it’s not as slick-looking as some other tools, that doesn’t really matter when the app’s functionality is more important.
While there are desktop clients for viewing and editing credentials and checking other account information, most will rarely use them in favor of the extensions that serve the password manager’s primary function: to automatically fill out login details and capture new ones.
Adding a new item is as easy as filling in a simple form, and you can attach notes and custom fields to each entry for total personalization.
We prefer using the web app, as it still includes complex authentication options and access to reports. The browser extension resembles the web app and includes a password generator, which makes using the password manager on the fly even easier.
Bitwarden includes plenty of features to make life easier. It automatically fills forms, quickly syncs passwords and data across devices, and tests your passwords for strength levels. Like many other apps, it monitors your password vault and lets you know if your information has been exposed in a security breach.
The web portal and apps come into their own when it’s time to access the other types of information stored in the vault. Saved payment details work with autofill, but you’ll need to log in to find identity information like driver’s licenses and passports. This can be really handy when you’re booking travels, so long as you know where your passport is when the time comes to board the plane!
Bitwarden promises to be compliant with a range of industry standards (Image credit: Bitwarden)Bitwarden: SecurityIt’s got a robust slate of security features, too. Your Bitwarden vault is secured with AES-256 encryption and your master password is never sent to Bitwarden – so there’s no chance of a breach from Bitwarden’s side of things.
Besides using Bitwarden’s own servers to keep your passwords online, so that you can access them from anywhere, you can also opt for self-hosting. This is designed primarily with businesses in mind, who can apply their own firewalls, proxies, and other services to maintain optimal security and compliance, keeping passwords inside their trusted infrastructure.
Bitwarden’s security measures go beyond zero-knowledge encryption, too. The app’s open source status means its source code is available online, resulting in more scrutiny from security experts – so problems get sorted in a timely fashion.
Bitwarden Business: Team and Admin FeaturesBitwarden’s two business plans offer the right amount of features to help organizations manage credentials efficiently.
The platform revolves around the concept of a vault where your users can securely store and manage not just their credentials, but also other sensitive information such as credit card details, and more.
The platform has two kinds of vaults. There’s the organization vault that is a shared space where teams or the entire organization can store and manage credentials collaboratively. In addition to this shared vault, all users also get a personal vault that only they can access.
Credentials placed in either of the vaults can be assigned to specific collections, which are then shared with teams or groups. Think of collections as folders that you can assign to different teams, or user groups. Collections let you segment access based on departments like IT, HR, Marketing, or even specific projects.
(Image credit: Bitwarden)All users in Bitwarden are assigned a role that helps determine what actions they can take. On the other hand, you also have the ability to set collection permissions, which help determine what actions a user can take with the items in a particular collection.
While roles can only be set at an individual-member level, permissions can either be set for an individual member or for a group as a whole.
So, for instance, you can have a member with a simple User role that gives them the ability to access shared items in assigned collections. By default, this user can also add, edit, or remove items from assigned collections. But you can revoke all except the permission to only view the items. This gives you fine-grained control over the use and sharing of credentials, and other sensitive information in your organization.
(Image credit: Bitwarden)You can also assign Custom roles to users, which allows for even more granular control of permissions. Using this role, you can, for instance, give a user permission to access event logs, or manage users.
Another core concept in the Bitwarden Business plans is called Bitwarden Send. Using this feature your users can securely share sensitive information, such as text or files, with people inside or outside the organization.
The sharing feature comes with adequate restrictions. For instance, you can set an expiration time and date, from one hour to 30 days. You can also limit access by number of views, and even lock access behind a password. This feature comes in handy when you want to share temporary credentials with contractors.
The business plans also offer a comprehensive suite of security policies. As admins you can enforce minimum requirements for master passwords, including length, complexity, and the use of special characters.
You can also set a maximum vault timeout duration to automatically lock vaults after a specified period of inactivity. For additional security, you can also make 2FA authentication mandatory for all users.
The platform also lets you disable certain features like personal vaults, or revoke a user’s ability to export data from their vaults. Similarly, you can also turn off the send feature to further prevent data exfiltration.
That said, Bitwarden does lack a couple of policy features that you get with its peers. For one, you can define a password rotation policy. There’s also no ability to restrict login attempts based on apps, or locations.
(Image credit: Bitwarden)Bitwarden Business: Integrations and CompatibilityBoth the Bitwarden business plans offer a couple of methods for automatic user and group provisioning, and deprovisioning.
For starters, the platform supports the System for Cross-domain Identity Management (SCIM) protocol, which allows you to automatically provision and deprovision users and groups from your existing identity provider (IdP), such as, Microsoft Entra ID, Okta, OneLogin, JumpCloud, and Ping Identity.
Both plans also allow the use of a standalone Directory Connector app that can sync users and groups from various directory services, including Active Directory, Microsoft Entra ID, Google Workspace, and others.
(Image credit: Bitwarden)Meanwhile, the Bitwarden Enterprise plan also supports Single Sign-On (SSO) integration, which allows users to log in to the platform using their existing credentials on various IdPs including Google, JumpCloud, AWS, and several others.
Both Bitwarden business plans also offer pre-built integration with popular Security Information and Event Management (SIEM) platforms like Splunk, Microsoft Sentinel, Panther, Elastic, and Rapid7. Thanks to this integration you can export the Bitwarden event logs into any of the supported SIEM platforms and combine it with other security data for enhanced threat detection and incident response.
Bitwarden Business: Ease of Use and DeploymentUnlike a majority of its peers, Bitwarden offers two deployment models. There’s the standard cloud-hosted model, and then there’s the self-hosted model. The ease of deployment differs significantly between the two, with cloud being a lot simpler.
Getting started with the cloud option just takes a matter of clicks as there’s literally no software to install or servers to configure.
On the other hand, while the self-hosted option offers maximum control, it requires significant technical expertise and IT resources to roll-out. While Bitwarden provides detailed guides to help you set it up, it's an involved process that’ll take some doing.
Despite the complexity, self-hosting is invaluable for businesses with stringent data residency requirements, or those operating in regulated industries that require full control over their deployment.
The cloud-hosting option also comes with a web-based admin console that is logically organized, and straightforward to navigate with clear menus. Its intuitive layout enables admins to quickly find and tweak the features and settings you need without extensive searching or training.
Onboarding users is a simple process that can be done manually by providing the platforms a list of email addresses of users you want to invite. Larger organizations can easily hook up Bitwarden with their existing IdPs to streamline onboarding and offboarding users.
Both Bitwarden business plans also have detailed logging and reporting abilities. The event log provides detailed, timestamped records of over 60 distinct event types within your organization, including user logins, password changes, failed logins, edits to groups, and collections, and a lot more.
(Image credit: Bitwarden)Then there are all kinds of vault health reports that can help identify weak, and reused passwords, as well as those that have been found in known data breaches.
All things considered, between the two deployment options, the Bitwarden business plans both empower business users with the right tools for managing passwords, and are also easy to administer.
Bitwarden has a useful help center and you can email the developers for support (Image credit: Bitwarden)Bitwarden: Customer supportBitwarden is an active open-source project, so there’s plenty of support in the form of an online community, tutorials, a knowledge base, and forums. Every common feature has a well-written tutorial and the user forums, while basic, are active and helpful.
You can even email the developers for support via an online support portal, with Premium subscribers getting priority. It’s impressive for an open-source project like Bitwarden to have the level of customer support that rivals commercial products. The only thing missing is phone support – that would have been a welcome addition, especially for business customers.
Unlike most other companies, because Bitwarden’s individual developers all have their own preferences, many of them are happy to interact with customers on other platforms, like Reddit and Twitter. These aren’t considered official help channels as such, but sometimes they’re a way to get a more authentic, personalized response.
Besides troubleshooting, the company’s blog is generally a good place to visit now and again to check for content relating to up-and-coming features, or just to alert you of something you might not have known such as how to create secure passwords.
Bitwarden: The competitionIf you’re willing to spend a little more, Dashlane adds identity theft protection to the mix. This adds credit monitoring, identity restoration support, and identity theft insurance that covers you up to $1 million should the occasion occur. Another paid password manager with more features than Bitwarden is LastPass.
If you have a specific feature or trait in mind, you may want to consider alternative avenues. For example, KeePass is another open-source password manager, while the likes of iCloud Keychain and Google Password Manager are among a growing number of services with support for passkeys.
Bitwarden: Final verdictThere’s lots to like about Bitwarden. It’s got rock-solid security options bolstered by the app’s open-source status. It works with virtually every device and browser you could think of – so it’s impressively versatile too.
When it comes to features this app ticks every mainstream box and it’s easy to use, even if it’s missing out on some of the slick design and high-end ability you’ll find elsewhere. But that's not a big issue when it’s got a tempting free product, good pricing on all of its paid options, and solid open-source security.
What to look for in a password managerBusinesses must diligently choose a robust password management solution when safeguarding sensitive information. Security is paramount; thus, a prospective password manager must offer advanced encryption standards, such as AES-256-bit encryption, to ensure that critical data remains inaccessible to unauthorized parties. It’s also imIt'stive that the service touts end-to-end encryption with zero-knowledge architecture, meaning even the service providers cannot access your passwords.
A business should seek a password manager that improves user-friendliness without compromising security. Employees should be able to navigate the system effortlessly, encouraging widespread adoption and adherence to security protocols. Cross-platform compatibility is another vital feature, guaranteeing that employees can securely access their credentials across various devices and operating systems, whether at their desks or on the go.
From an administrative perspective, managing user access, enforcing security policies, and monitoring usage are critical for maintaining company-wide password hygiene. Businesses should look for services that provide comprehensive admin controls, user provisioning, and detailed audit logs. Moreover, scalability is crucial – the chosen solution should be able to accommodate the growth of the business, with flexible plans that can be adjusted as the company expands or its needs evolve.
Budgetary considerations are inevitably part of the decision-making process; hence, a password management solution should offer transparent pricing with a clear understanding of what features are included at each pricing tier. It is beneficial to seek out options that provide a good balance of advanced features and cost-effectiveness, including premium customer support, to promptly address any technical issues or security concerns that may arise.
Lastly, while it is vital to focus on immediate needs, it is just as important to consider future-proofing. The chosen password manager should be from a reputable provider that updates the latest security trends and threats, ensuring the business is equipped with up-to-date protection. This forward-thinking approach secures the present and long-term integrity of a business's sbusiness'sata and online assets.
A new NYT Strands puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Tuesday's puzzle instead then click here: NYT Strands hints and answers for Tuesday, July 22 (game #506).
Strands is the NYT's latest word game after the likes of Wordle, Spelling Bee and Connections – and it's great fun. It can be difficult, though, so read on for my Strands hints.
Want more word-based fun? Then check out my NYT Connections today and Quordle today pages for hints and answers for those games, and Marc's Wordle today page for the original viral word game.
SPOILER WARNING: Information about NYT Strands today is below, so don't read on if you don't want to know the answers.
NYT Strands today (game #507) - hint #1 - today's themeWhat is the theme of today's NYT Strands?• Today's NYT Strands theme is… Chips in
NYT Strands today (game #507) - hint #2 - clue wordsPlay any of these words to unlock the in-game hints system.
• Spangram has 9 letters
NYT Strands today (game #507) - hint #4 - spangram positionWhat are two sides of the board that today's spangram touches?First side: left, 4th row
Last side: right, 4th row
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Strands today (game #507) - the answers(Image credit: New York Times)The answers to today's Strands, game #507, are…
The first word I saw on today’s grid was SAUCE and bearing in mind the theme, I was certain that it would be correct.
Then I remembered the UK-US chip difference – in brief, Fries = Chips, Chips = Crisps, Ketchup = Sauce – and deduced we were looking for things you could dip chips (or crisps) in.
There is plenty of controversy in Strands’ selections though, regardless of your nationality. HUMMUS is not something you’d dip chips in surely or FONDUE – which is famously served with cubes of bread.
Anyway, this was a fun search for interesting words. I don’t think I would have found the brilliantly spelled TZATZIKI without the help of it being my final word.
Yesterday's NYT Strands answers (Tuesday, July 22, game #506)Strands is the NYT's not-so-new-any-more word game, following Wordle and Connections. It's now a fully fledged member of the NYT's games stable that has been running for a year and which can be played on the NYT Games site on desktop or mobile.
I've got a full guide to how to play NYT Strands, complete with tips for solving it, so check that out if you're struggling to beat it each day.
A new NYT Connections puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Tuesday's puzzle instead then click here: NYT Connections hints and answers for Tuesday, July 22 (game #772).
Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need Connections hints.
What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.
SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.
NYT Connections today (game #773) - today's words(Image credit: New York Times)Today's NYT Connections words are…
What are some clues for today's NYT Connections groups?
Need more clues?
We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…
NYT Connections today (game #773) - hint #2 - group answersWhat are the answers for today's NYT Connections groups?
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Connections today (game #773) - the answers(Image credit: New York Times)The answers to today's Connections, game #773, are…
I made both of my mistakes today trying to collate DREAD-INDUCING FIGURES. I thought it had something to do with mythical creatures, so had GEODUCK and then TITMOUSE instead of BUGBEAR – which in hindsight seems somewhat ridiculous.
Now, thanks to Google, I know that a geoduck is a kind of clam rather than a mythical beast, and part of the excellent ANIMALS ENDING WITH ANIMALS group . Congratulations to all who spotted that one.
KINDS OF STEAK was the first thing I thought of when I saw PORTERHOUSE at the start of the game, but I needed the options to reduce before I could get the others. CHATEAUBRIAND – which is a thick cut of beef tenderloin – is a new word for me.
Yesterday's NYT Connections answers (Tuesday, July 22, game #772)NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.
On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.
It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.
It's playable for free via the NYT Games site on desktop or mobile.
A new Quordle puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Tuesday's puzzle instead then click here: Quordle hints and answers for Tuesday, July 22 (game #1275).
Quordle was one of the original Wordle alternatives and is still going strong now more than 1,100 games later. It offers a genuine challenge, though, so read on if you need some Quordle hints today – or scroll down further for the answers.
Enjoy playing word games? You can also check out my NYT Connections today and NYT Strands today pages for hints and answers for those puzzles, while Marc's Wordle today column covers the original viral word game.
SPOILER WARNING: Information about Quordle today is below, so don't read on if you don't want to know the answers.
Quordle today (game #1276) - hint #1 - VowelsHow many different vowels are in Quordle today?• The number of different vowels in Quordle today is 3*.
* Note that by vowel we mean the five standard vowels (A, E, I, O, U), not Y (which is sometimes counted as a vowel too).
Quordle today (game #1276) - hint #2 - repeated lettersDo any of today's Quordle answers contain repeated letters?• The number of Quordle answers containing a repeated letter today is 3.
Quordle today (game #1276) - hint #3 - uncommon lettersDo the letters Q, Z, X or J appear in Quordle today?• Yes. One of Q, Z, X or J appears among today's Quordle answers.
Quordle today (game #1276) - hint #4 - starting letters (1)Do any of today's Quordle puzzles start with the same letter?• The number of today's Quordle answers starting with the same letter is 0.
If you just want to know the answers at this stage, simply scroll down. If you're not ready yet then here's one more clue to make things a lot easier:
Quordle today (game #1276) - hint #5 - starting letters (2)What letters do today's Quordle answers start with?• O
• P
• R
• W
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
Quordle today (game #1276) - the answers(Image credit: Merriam-Webster)The answers to today's Quordle, game #1276, are…
A tricky one today that took me far longer than usual.
OZONE was hard to get. Once I’d decided to look for words beginning with the letter O, I got there more quickly – but I required a lengthy period of putting in random letters until I got there.
PENCE was a kicker, too, as it’s a recurring Quordle word – the last time was just two weeks ago.
Daily Sequence today (game #1276) - the answers(Image credit: Merriam-Webster)The answers to today's Quordle Daily Sequence, game #1276, are…
Using a password manager is crucial if you want to protect your important information and ensure that you’re covered if you forget one of those all-important codes. If you’re looking for the best password manager, consider 1Password. This app has a strong business pedigree, with companies like IBM, GitLab, and Slack trusting the software to keep passwords secure and consistent. With customers like that, it’s undeniably a top option for your family or organization.
Like any technology solution, 1Password has its mix of advantages and disadvantages. In this blog post, we'll explore the pros and cons of using 1Password to help you decide if it's the right password manager.
One of 1Password’s most significant advantages is its strong focus on security. It utilizes end-to-end encryption, meaning your data is encrypted before it leaves your device and can only be decrypted with your Master Password, which 1Password does not store or have access to. This approach minimizes the risk of data breaches and unauthorized access.
1Password boasts a sleek and intuitive interface that simplifies password management whether using the desktop app, browser extension, or mobile app, navigating through your data and accessing your passwords is straightforward and hassle-free.
With the increasing importance of two-factor authentication (2FA), 1Password's ability to generate and store one-time passwords (OTPs) is a significant plus. This feature enhances security and consolidates your login and 2FA data in one spot.
Another notable advantage of 1Password is the ability to securely share passwords and sensitive information with family members or team members. Depending on your subscription plan, you can control who can access specific items, ensuring that sensitive data is only shared with authorized individuals.
1Password supports various devices and platforms, including Windows, macOS, iOS, Android, and Linux. It also offers extensions for popular web browsers, ensuring you can access your passwords no matter where or what device you're using.
Unlike some competitors offering a free version, 1Password operates on a subscription model. While there is a 14-day free trial, long-term use requires a subscription. This ongoing cost may be a drawback for users who prefer a one-time purchase or a free solution.
For users new to password managers, the array of features and settings with 1Password can be overwhelming at first. While user-friendly, there's a learning curve to utilize all its functionalities efficiently.
While 1Password's free trial allows users to explore its features, it could be more robust in functionality compared to the full version. This limitation might not provide a comprehensive user experience assessing the tool's capabilities.
For the highly security-conscious, storing sensitive information in the cloud (even with solid encryption) might be a concern due to the theoretical risks of cloud breaches. Although 1Password's security is top-notch, the very nature of cloud storage can be a deal-breaker for some.
Certain features of 1Password, such as accessing your password vault from a new device, require an internet connection. While you can view and use stored passwords offline, initial setup and synchronization across devices need the internet.
We’ve evaluated 1Password’s family and business plans to see if this app is worth using – or if you should seek out a competitor instead. And if you want to explore those alternatives, take a look at our roundup of the best business password managers.
(Image credit: 1Password)1Password: Plans and pricing1Password offers different plans tailored to fit individual and business needs. Let's take a closer look:
For Individuals and Families
* Individual Plan (from $2.99 per month): Designed for one person, this plan includes access to all devices, protection for your data, and around-the-clock email support.
* Family Plan ($4.99 per month for up to five): This plan is ideal for household use. It has all the features of the individual plan but allows you to share passwords, credit cards, secure notes, and more with family members.
For Teams and Businesses
* Teams Plan ($20 per month for up to 10 users): Built for collaboration, this plan provides features that help manage team access to shared vaults, with admin controls and secure document storage.
* Business Plan ($8 per user per month): Tailored for larger organizations, the business plan includes everything from the Teams plan and additional advanced tools for security audits, custom roles, and more.
1Password may also offer unique plans, typically discounted, targeted at specific users, such as students, educators, or non-profit organizations.
1Password: SetupAs a leading password manager that simplifies password management while bolstering security, setting up 1Password in a work environment is a strategic move towards enhancing your company's digital security posture. In this guide, we'll walk you through every step of the process.t
Before diving into the setup, it's crucial to understand why 1Password is an asset for any organization. It goes beyond storing passwords - 1Password can manage secure notes, documents, and credentials, ensuring that all sensitive information is kept within a tamper-proof digital vault. Additionally, it enhances productivity by streamlining the login process for various work tools and platforms, reducing the time employees spend managing their passwords.
Step 1: Sign Up and Create Your Account
Begin by visiting the 1Password website and signing up for the plan that best suits your organization's needs. During this process, you'll create an account that will serve as the main administrative hub for managing your team or business.
Step 2: Configure Your Vault
Upon setting up your account, the next step is to configure your vaults. Vaults are secure containers where items like passwords, notes, and documents are stored. You can create multiple vaults for different departments or projects to keep your organization's data organized and accessible to the right people.
Step 3: Adding Users and Groups
After your vaults are configured, you'll need to add your team members. This can be done individually or in bulk through an invitation link or email. Additionally, consider setting up groups for easier management, allowing you to assign vault access to entire teams rather than individual users manually.
Step 4: Establish Security Policies
One of the key benefits of 1Password is the ability to customize security policies. This includes enforcing Two-Factor Authentication (2FA), setting password strength requirements, and configuring other security settings tailored to your organization's security guidelines.
Step 5: Training and Support
With your 1Password setup complete, the final and crucial step is training your team. Ensure that everyone understands how to use 1Password effectively, including storing and managing passwords, using the browser extension, and accessing their vaults. Take advantage of the resources and support provided by 1Password for a smooth transition.
(Image credit: 1Password)1Password: Interface and performance1Password provides convenient access on virtually all devices. Along with mobile apps for iOS and Android, the platform also provides desktop apps for macOS, Windows, and Linux, plus a command-line tool and extensions for popular browsers including Chrome, Edge, Firefox, Brave, and Safari. There are also some more quirky options, like Apple Watch support.
It’s a very intuitive app. On the left-hand side, there’s a navigation column that allows users to access their private or shared vaults, tutorials, and their popular passwords. Here you’ll also find the Watchtower, which keeps track of security breaches and lets you know if your details have been compromised. In the main window, you can see all your passwords, messages or alerts, and the search box – which is extremely fast.
Adding new passwords is simple and comprehensive. You’re able to choose from more than two dozen security categories – from straightforward login and credit card details to medical records and passports – and each category collects different kinds of relevant information. It makes creating passwords easier – and speeds up categorization, too.
This is a highly responsive app, too, with changes on one device showing up on other devices almost instantaneously. We’re really fond of the small highlights than run across the top of the UI and throughout the experience, such as Wi-Fi passwords, medical records, identity information, and payment details.
Logging in online is a little more of a task than it is with other password managers. You still use your master password to get in, but you also need to authorize it by copying and pasting a so-called secret key to verify it’s you. We feel this could be handled a little easier, even if by manner of notification to the apps that are already signed in. Dashlane does something similar, and emails a one-time code to the account holder too, just for that extra layer of protection.
(Image credit: 1Password)1Password: Security1Password uses a wide range of tools to keep your information as secure as possible. Accounts are locked by a master password, which is never shared with 1Password or any third parties. Beyond that, you’ve got your Emergency Kit, which includes a secure key you’ll need to use when logging in.
1Password provides two-factor authentication with Authy and Microsoft Authenticator, and it comes with security breath alerts, protection against keyloggers, and AES 256-bit encryption. Your passwords are also protected with Secure Remote Password (SRP), which adds another layer of credential authentication.
(Image credit: 1Password)1Password Business: Team and Admin Features1Password for Business pitches itself as a robust enterprise password management platform that’s designed to meet the needs of businesses of all sizes. It offers a comprehensive set of features that help facilitate secure credential management, while streamlining administrative tasks, and can also integrate with your existing IT infrastructure.
Its shared vault system is particularly useful for use in a business setting. In the context of a password manager, think of a vault as a secure container that stores login credentials, as well as other secure information like credit card details.
The vaults in 1Password Business provide granular access control with over a dozen distinct permissions, which allow you as admins to control who can view, edit, copy, share, or export items within the vaults.
You can also choose which apps can be used to access this vault. For instance, if you aren’t using 1Password Business’ developer features, you can disable access to the vaults from the CLI tool. Similarly, if you only want your users to access the vault through the browser extensions, and the Android and iOS apps, you can disable access through its Windows, macOS, and Linux apps.
The platform also has an interesting Travel Mode feature that allows your users to temporarily remove access to all but certain vaults that have been marked as Safe for Travel. This helps protect sensitive business credentials and data from potential exposure during travel, especially during border inspections or other security checks.
Like all its peers, you can also use 1Password Business to create custom groups based on the departments, or projects in your organization. You can then assign specific permissions and responsibilities to these groups, such as the ability to invite, and remove people, create vaults, recover accounts, and more, facilitating efficient delegation and management.
Setting permissions at the group level allows for scalable permissioning. You can then assign vault access once to the group instead of each user.
In addition to regular users, 1Password Business also has a concept of guest users. These are individuals who are granted limited access to specific shared vaults. They don't have their own private vault, nor can they access all the shared vaults within the organization. Instead they can only access a designated vault that you’ve earmarked for them. A guest user can be a freelancer, a contractor, or anyone who needs limited access to specific information, like project-related passwords or client-specific details.
(Image credit: 1Password)The platform also lets you define various security policies. The authentication policy helps create rules to manage how your users authenticate with, and log into the platform. You can use these to require strong master passwords, and select a two-factor authentication (2FA) mechanism. 1Password Business supports multiple 2FA options including the use of an authenticator app, security keys, and the Duo authentication service. You can also choose to make 2FA mandatory for all users.
Then there are sharing and permissions policies, where you create rules for features like credentials sharing. For instance, if you don’t want your users to share items with anyone, you can restrict them to only share items with someone who uses an email from an approved domain. You can also define the expiration settings for the shares, and more.
Finally, there are the firewall policies that you can use to restrict access to the platform, based on country, continent, or IP address.
1Password Business backs it all up with extensive logging and reporting mechanisms that provides a comprehensive trail of all actions within the 1Password account, including who accessed or modified what items and when.
1Password Business: Integrations and CompatibilityYour users can access their credentials from various devices and platforms as 1Password offers apps for all the popular desktop and mobile operating systems including Windows, macOS, Linux, iOS, and Android, along with browser extensions for Chrome, Firefox, Safari, and Edge.
1Password Business also integrates with all the major identity providers (IdPs) such as Google Workspace, Microsoft Entra ID, Okta, OneLogin, JumpCloud, and Rippling through the SCIM Bridge. This helps streamline user management as it allows for automated provisioning and deprovisioning of users and groups.
The platform also integrates with leading Security Information and Event Management (SIEM) tools such as Splunk, Sentinel, Elastic, Sumo Logic, Panther, and several others. Thanks to this, the platform can stream activity to the SIEM tools for more detailed auditing and security analysis.
1Password Business also offers a robust set of developer tools that can help integrate secret management into various stages of the software development lifecycle. For instance, developers can generate, import, and store their SSH keys directly within 1Password, and also help it integrate with Git workflows.
Then there’s the 1Password CLI that allows developers to securely access items stored in 1Password directly from the terminal. 1Password Business can also integrate with popular CI/CD platforms like GitHub Actions, CircleCI, and Jenkins, and Infrastructure as Code (IaC) tools like Kubernetes, and Terraform.
1Password also provides an open source Software Development Kits (SDKs) for popular programming languages like Python, and JavaScript, and also offers an extension for the Visual Studio Code IDE.
1Password Business: Ease of Use and DeploymentDeploying 1Password Business is relatively straightforward. The initial setup, as outlined earlier, can be completed quickly, and the user onboarding process is intuitive enough.
From an administrative standpoint, the interface is clean and neatly arranged. Most of the regular admin tasks can be completed without too much mucking about the interface, and don’t require extensive technical knowledge. That said, you’ll need to have IT chops to tackle more advanced tasks like IdP integration.
(Image credit: 1Password)1Password Business’s web-based admin interface provides an overview of user activity, vault access, security insights, and policy compliance. There’s also an activity log that can help you track events like vault access, user logins, sharing activities, policy changes, and more. All activity is timestamped, and the log can be easily filtered.
(Image credit: 1Password)The platform also has various reports, like breach report, and business watchtower. After you’ve verified the domain controlled by your company, the breach report will flag accounts, information, and employees that have been exposed in data breaches. Then there’s the business watchtower report that identifies security issues like weak passwords, across all your vaults.
(Image credit: 1Password)Besides these, you also get detailed usage reports, adoption reports, team reports, devices reports, and more. Then there’s the insights dashboard that offers analytics on data breaches, password health, and team usage.
All things considered, the 1Password Business admin interface strikes a good balance between power and simplicity, and works well for all sized organizations.
1Password: SupportWith 1Password, you’ll have access to 24/7 support via email. The website states that Business users get VIP support, but it doesn’t explain the difference between regular and VIP—just that help is available “whenever you need it.” As mentioned above, Enterprise subscriptions come with a dedicated account manager and onboard engineer.
The 1Password site also provides helpful articles covering a variety of support topics. These are a great place to start if you run into technical issues or want to learn more about the service’s features. Users can also access security white papers if they’d like a deeper dive into how the service works.
1Password: The competitionLastpass, one of the most popular password managers, comes with some notable pros and cons compared to 1Password. Unlike 1Password, Lastpass offers a surprisingly robust free plan that enables users to store and share passwords across all their devices.
Furthermore, Lastpass Emergency makes it easy to configure a digital will that automatically transfers your information in case of an emergency or death. The only way to set this process up on 1Password is to pay for a family or team plan and create multiple admins or organizers. That said, Lastpass and 1Password come with many of the same features, and their pricing is mostly similar aside from the Lastpass free plan.
If you’re after more than a password manager, Dashlane and Proton Pass are among the handful that offer VPN connections for certain plans, all in a bid to keep your identity protected.
1Password: Final verdict1Password offers everything individuals and businesses need to store and share passwords and other sensitive pieces of information. The spread of pricing options means it’s a low-cost way to keep your data safe.
In addition to mobile apps, the service is also compatible with macOS, Windows, and Linux along with several browsers. Its flexibility, affordability, and ease of use make it a great option for companies and home users.
We've listed the best password recovery software.
What to look for in a password managerIn today's world, where digital security breaches are not just common but expected, the importance of robust password management cannot be overstated. Password managers have become essential tools for individuals and businesses striving to secure their digital realms. However, with many market options, it can be challenging to know what features to prioritize when selecting a password manager. Here's a curated checklist to guide your choice.
Non-Negotiable Features
Encryption is the foundation of a password manager's security. Choose a service offering strong encryption, such as 256-bit encryption — the standard governments and militaries use worldwide. This encryption level ensures that even if data gets intercepted, it remains indecipherable without the unique key.
A zero-knowledge protocol means the service provider does not know your data. Your passwords and sensitive information are encrypted locally on your device before syncing with the server. Ensure your chosen password manager offers end-to-end encryption, with decryption only possible on your device.
Two-factor authentication (2FA)
Two-factor authentication adds an extra layer of security by requiring a second form of verification beyond just the master password. This could be a biometric scan, a security key, or a code generated by an authenticator app. A password manager that supports 2FA significantly enhances your protection against unauthorized access.
Important Usability Features
Your digital life isn't confined to one device, so your password manager shouldn't be either. Cross-platform compatibility ensures you can access your passwords on a PC, Mac, Android, or iOS device. Check for seamless integration with various operating systems and browsers for a smooth experience.
One of the main benefits of a password manager is convenience. Look for features like autofill and auto-login that save time and prevent the risk of typing errors. This facilitates a smoother and faster login process without compromising security.
Strong, unique passwords are essential for secure accounts. A built-in password generator that can create complex passwords enhances security by eliminating the human tendency to reuse passwords or choose easy-to-guess options.
Additional Considerations
A simple, intuitive interface makes a big difference, especially for teams or individuals less familiar with tech. Ease of use encourages adoption and regular use, which is critical for maintaining security practices.
Consider recovering access to your account in case of a forgotten master password. Options like account recovery using a trusted device or emergency access for trusted contacts can be life-saving without compromising the security of your data.
Evaluate the cost relative to the features offered. Many password managers offer a basic level of service for free, with premium features available for a fee. Consider what features are must-haves for you and whether the cost of a premium plan justifies its benefits.
Choosing the right password manager is a balancing act between security features and usability. The ideal tool secures your digital life from threats while seamlessly integrating into your daily routine. You can select a password manager that protects your information and enhances your online experience by focusing on solid encryption, zero-knowledge architecture, and essential usability features. Remember, in the quest for digital security, your password manager becomes your closest ally.
Microsoft has provided more details on how its PC-to-PC migration feature will actually work when it comes to switching over to a new Windows 11 PC.
The feature is designed to smooth over the upgrade to a new PC, and make it as easy as possible - albeit with some caveats - and clearly the focus is on helping Windows 10 users switch to Windows 11 (assuming their hardware supports the latter OS).
Previously, PC-to-PC migration has been seen in testing, and Microsoft has put the shell of the experience in the release version of Windows 11 (with the latest update) - however, it isn't yet functional.
At least we now know exactly how the ability will work thanks to a support post Microsoft has uploaded (as Thurrott.com spotted). So, let's dive into all the key details you need to know.
The old PC and new PC you're transferring over to will need to be on the same network, either connected via Ethernet (wired, to your router) or wireless (on the same Wi-Fi network).
Both machines will also need to be signed into a Microsoft account - so with the new PC, you'll have to sign in to an account during setup. Once that initial setup is run, you can kick off the PC-to-PC migration, which will pair the PCs using a one-time-code.
You'll then have to select what you want to transfer across in the way of files or settings. You can transfer almost everything in terms of files and the options you've chosen in Windows, including personalized elements of the desktop (wallpapers or themes), but there are a few exceptions.
What won't be ported across includes temporary and system files (which you wouldn't want anyway), as well as the apps installed on the old PC, and saved passwords (though you may have them stored in your browser, anyway).
Once you've chosen the data and settings to be ported across, the process will begin, providing you with a timer as an indication of how long you'll be waiting (hopefully an accurate one - these countdowns aren't always that reliable).
If the network connection should drop somehow, Microsoft says that Windows will automatically try to resume the data transfer when it's back up again - though you can manually restart the process if all else fails.
Analysis: backup or migration(Image credit: Getty Images)The PC-to-PC migration feature is essentially an alternative for those who haven't configured a backup (saved to OneDrive) via the Windows Backup app. If you have one of those, you can simply deploy that backup on the new PC - if not, you can use PC-to-PC migration instead (as a local data transfer method, but you must still be signed into a Microsoft account as noted). Or at least you'll be able to when it's fully released to Windows 11 (and 10) PCs, which should happen soon enough - I'm betting Microsoft will want this up and running before Windows 10 reaches End of Life (for obvious reasons).
It's worth noting that if you do configure a backup on the Windows Backup app - just to sync your device settings, in fact - you get an additional year of support for Windows 10 for free (dodging the $30 fee Microsoft had previously slapped on this option).
So, Backup is clearly an app Microsoft wants people to use - and I can see that choice being a popular stopgap measure to put off any decision on upgrading to Windows 11 until next year - but it's good to see that PC-to-PC migration is being offered up as another way forward, with fewer strings attached (OneDrive-wise, though you still have to use a Microsoft account).
With PC-to-PC migration, the main thing you don't get ported over to the new PC is your apps, but that isn't surprising. Indeed, the Backup app won't provide your apps when it restores a backup - although it can restore apps from the Microsoft Store, and with third-party apps, provide a link to download them for convenience (you don't get that ability with the new migration feature).
The main difference with the new feature, then, is that migration does not require or use OneDrive (albeit it does need a Microsoft account), and there are no options pertaining to keeping your apps (even if using Windows Backup is limited in that respect, too).
Some other notable caveats with PC-to-PC migration are that it doesn't work with drives that are encrypted with BitLocker (they must be decrypted first), and that devices with Arm CPUs aren't supported either (yet). Given that Microsoft says Arm PCs aren't "currently" catered for, I expect that to change soon enough - especially as these represent a fair chunk of Copilot+ PCs, which are the machines Microsoft is busy trying to get everyone to buy into.
As noted, we're still waiting for the full PC-to-PC migration experience to be enabled in Windows 11 (and Windows 10), but it shouldn't be too long before this happens.
You might also like...Lots of password managers are free, and plenty more only unlock a good range of features if you pay loads of cash – but Sticky Password tries to bridge the gap.
Sticky Password is developed by Lamantine Software, a company that includes some of the original creators of AVG Antivirus.
This app attempts to deliver the best of both worlds by offering a free version with loads of features, including unlimited encryption and storage and biometric authentication – so it’s very capable for lots of people. The paid version is no less impressive, with cloud syncing, secure sharing and emergency access.
Then there’s Sticky Password for Teams, which is a comprehensive password management solution tailored for businesses. It offers all the security features as its consumer variant, alongside administrative controls to help streamline the use of passwords for a team of users.
We’re going to find out if Sticky Password can compete with the best password managers currently available.
Sticky Password: Key FeaturesSticky Password offers essential features such as password sharing, password autofill, password generation, automatic syncing, and encrypted storage of credit cards and digital notes.
Sticky Password can generate long, complex password strings up to 99 characters long. You can customize the length and character types, and can combine uppercase and lowercase letters, numbers, and symbols to maximize protection.
(Image credit: Sticky Password)The app can also help you save lots of time with its automatic form filling feature. You can use it to create and manage identities, and save everything from personal, email, and address details to credit card details, passport information, and more. Besides these, the app also lets you securely save any text with its Secure Memos feature.
Sticky Password also offers a suite of powerful features designed specifically for business. For instance, it allows admins to specify different permissions for different people. This makes it easy for businesses to streamline their password management and reduce points of weakness in the system.
The app also monitors the dark web and will alert you (and the concerned employee) if any of the managed credentials are found in known data thefts or leaks.
As a business product, Sticky Password for Teams has a centralized admin console. You can use it to add or remove users, delegate administrative rights, and more. As an admin you can even manage the entire team's licenses, including renewals and seat allocations, through this interface.
You can also grant, manage, and remove access to shared passwords with specific permissions for different people, to ensure your employees can collaborate securely. You can even earmark individuals who can access critical accounts in case of emergencies.
(Image credit: Sticky Password)For this, the app allows you to set the conditions under which access will be granted. The emergency contact will be granted access after sending you a request that you can reject during the waiting period.
The paid version of the app ensures all your passwords, and other encrypted data is synchronized across all devices, including desktops, tablets, and smartphones. It offers multiple options for this purpose, which is one of its best features.
You can either choose to sync the data over the cloud, which is very convenient if you have employees on the go, or, you can choose to sync over the local Wi-Fi router. Local Wi-Fi sync means that devices on the same network can share encrypted passwords and credentials without this data ever leaving the premises. This is ideal for businesses operating in one primary location because you can share passwords among colleagues in total security.
Importantly though, Sticky Password gives you full control over the devices and the network your data is synced over.
A final security feature we haven’t seen before is Sticky Password’s use of Intel Software Guard Extensions (Intel SGX) to further secure the sensitive data stored on a device. So even if an employee’s computer is stolen, the thief will be unable to access Sticky Password data that is encrypted and stored deep within the device’s CPU chip. Note however that this requires you to have a 7th Gen, or newer processor.
Sticky Password: Security and complianceTop-notch security protocols are essential for any password manager, and Sticky Password doesn’t disappoint. Sticky Password uses all the industry-standard encryption protocols, and also goes further, offering innovative security features that are perfect for businesses.
Not only does Sticky Password encrypt all data end-to-end with 256-bit AES encryption, but it does not store the master password or the encryption key. Without these, no one, not even Sticky Password, can unencrypt your business’s valuable passwords and data. Elsewhere you’ve got fingerprint scanning, and this software runs portably – so it can boot from USB sticks and memory cards.
To ensure security when transferring passwords, Sticky Password uses the concept of trusted devices. These are devices that have been specifically authorized to access and synchronize your encrypted password database.
(Image credit: Sticky Password)Such devices are added to a whitelist on the admin console, after which they can perform synchronization operations. The first device you use with Sticky Password is automatically authorized during the initial setup. Additional devices require individual authorization, which is done by sending a one-time PIN.
For added security, you can also enable two‑factor authentication, which works in conjunction with the Google Authenticator app. Sticky Password can also be made to use biometric authentication. For this, you can verify your identity with a swipe of a finger on Android and iOS devices.
Sticky Password’s storage space and back-end system reside on secure Amazon AWS services (Amazon S3 and Amazon EC2), and according to its Privacy Policy, the app adheres to General Data Protection Regulation (GDPR) standards.
Sticky Password: SetupSticky Password has native apps for all the popular desktop, and mobile operating systems, including several releases of macOS, Windows, iOS, and Android.
The platform is also compatible with over a dozen of the best web browsers, from popular ones like Google Chrome, Brave, Safari, Mozilla Firefox, Microsoft Edge, Opera, to other more obscure options like Vivaldi, Comodo Dragon and Sidekick.
The apps themselves are easy to download and install. It’s necessary to make an account before logging in, but this simply requires an email and password. We also recommend installing the Sticky Password browser extensions.
While it doesn’t have native Linux apps, you can use it on the best Linux distros like Ubuntu, and Fedora, and even on Chromebooks, through the contactless connect feature. This feature also gives you access to your passwords on shared computers where you can’t install the Sticky Password app.
Using contactless contact involves scanning a QR code with the Sticky Password app on your mobile device. That said, accessing passwords through this feature, while being completely secure, requires a little running around, and isn’t as convenient as using a native app.
Sticky Password: Interface and performanceThe Sticky Password desktop application has a pleasing layout and makes it easy for the user to find important information and control their account. The security dashboard is particularly useful for visualizing security weaknesses.
(Image credit: Sticky Password)We were impressed with the speed of syncing. Using both a mobile and desktop device simultaneously resulted in a seamless experience. Once we had entered credential information on a desktop site, we could immediately log in password-free on a mobile device.
When setting up Sticky Password for Teams, the first person to activate the team license key on their device automatically becomes the team administrator. Once the admin is set up, you can invite other team members through the admins’ web interface.
Head to My team under the StickyAccount section to add and remove team members.
You can invite users via their email addresses. They’ll then receive instructions on how to install Sticky Password and join the team. Once added, you can also assign (and later revoke) admin rights to other team members.
If your colleges already have a StickyID, you can simply email them the team license key, which they can then plug into their account.
It’s a good idea to check your list of trusted devices from time to time. Head to Dashboard > Trusted devices to see the list of trusted devices, and remove the ones that are no longer in use. Removing a trusted device will also remove the local database and backups created by Sticky Password on this device.
The other tasks can be performed by the team members from their native Sticky Password desktop app. The first thing they should do is head to Menu > Import to import all their passwords in bulk. Sticky Password can import data from all the popular web browsers, as well as from the best password managers such as Bitwarden, BitDefender, KeePass, LastPass, RoboForm, and more.
(Image credit: Sticky Password)They can then also navigate to the Web Accounts tab to manually store their usernames and passwords for online accounts and services. Then there’s the App Accounts section where your users can store credentials for any locally installed app, such as for Skype or a remote desktop connection.
(Image credit: Sticky Password)Then there’s the Sharing Center where you can share passwords with other Sticky Password users, and manage their access and permission levels. As an admin, you can set individual permissions for each team member, and grant them either limited read-only rights, or full rights. The latter gives them the same rights as you, and they even have the authority to revoke your access as well.
Finally, head to Emergency Contacts under the Sharing Center section to add emergency contacts.
One of the most important sections of the Sticky Password app is the Security Dashboard. From here your users can monitor their password hygiene, and security posture. It helps identify and change weak, expired, reused passwords, and those that were exposed in a data breach.
(Image credit: Sticky Password)Sticky Password: Plans and pricingSticky Password offers a single Premium plan for businesses, with access to a 30-day free trial first. It costs $29.99 user/year, making Sticky Password more affordable than most of its competitors.
Similarly, individuals also get a single Premium product, which costs $29.99 for a one-year license. However, if you’re sure that you want to stick with Sticky Password for the long haul, the lifetime license for individuals costs $79.99.
Individuals can also use Sticky Password for free, which is meant for users who need to store and access their passwords from a single device, since it doesn’t have any synchronization ability. Also, just like business users, individuals too can take the Premium version for a spin with a 30 day free trial.
Sticky Password: SupportThe Sticky Password website has a help center, so most of the time, troubleshooting can be done online without needing to contact the Sticky Password team.
For more complicated issues, businesses have access to online support with an average wait time of fewer than 24 hours. We would like to have seen a more responsive support service, as the lack of phone support might deter some businesses from investing in Sticky Password.
Sticky Password: The competitionWhile Sticky Password provides an excellent core service, we think businesses might be better off considering a password management solution with greater administrator control over user settings and privacy.
Competitors such as NordPass, LastPass, and RoboForm all provide more advanced analytics that medium and large-sized businesses are likely to appreciate. Although these providers are more expensive, companies that value user management and centralized access control might prefer to consider one of them.
Also note that unlike many other business password managers, you can’t use Sticky Password for Teams to provision users by integrating with in-house or cloud directory servers like active directory, or Microsoft Entra ID.
Sticky Password: Final verdictSticky Password is a middle-of-the-pack password management solution. Although it may not be the best password manager available, it is still a highly secure platform with just enough features to please business users.
In particular, we think local WiFi sync and Intel SGX are innovative features that might convince businesses to rely on Sticky Password for their organization. However, the lack of advanced business features like Active Directory integration means the app will only work for small businesses, rather than large companies.
On the flipside, its limited feature set means Sticky Password is also more affordable than many of its competitors. Given the fact that it makes no compromises when it comes to security, Sticky Password manages to successfully position itself as one of the most secure password managers available for small businesses.
Coca-Cola's move comes a week after President Trump said he had been talking to the soft drink giant about using cane sugar rather than high-fructose corn syrup in its signature drink.
(Image credit: Brandon Bell)
iOS 26 is imminent and is expected to come to public beta very soon. While we’re excited to see how Apple’s biggest software update will upgrade the iPhone experience, Apple Watches will also be getting the same treatment when watchOS 26 is rolled out, and we're just as excited.
If you own an Apple Watch Series 6 or later, an Apple Watch SE 2, or any Apple Watch Ultra model, then you’ll be able to reap the benefits of watchOS 26’s exciting new features. However, it does come with some setbacks.
Though the models mentioned above will receive a lot of handy new functions, there are four watchOS 26 features that will only be available to use on the Apple Watch Series 9, Apple Watch Series 10, and Apple Watch Ultra models only – leaving owners of older models in the dust.
It’s best to double-check and see what watchOS 26 features your current Apple Watch model will support when the update is rolled out in September. If you want to make the most of more advanced features, take this as your sign to upgrade in time for watchOS 26.
(Image credit: Apple)4 features your older Apple Watch won’t getThe following features will be available on Apple Watch Series 9, Apple Watch Series 10, and Apple Watch Ultra models only.
1. Wrist FlickIn 2023, Apple rolled out the Double Tap gesture for the Apple Watch, a multi-functional feature that allows you to do things such as close Smart Stack, begin workouts, silence alarms and timers, and dismiss notifications.
Apple’s Wrist Flick function is a new hands-free gesture designed to carry out similar functions which sounds a lot more reliable than Double Tap, but only the Apple Watch models mentioned above will be able to support this.
2. Smart Replies updates (Image credit: Apple)While it doesn’t matter which iPhone model you have (as long as it supports the latest version of iOS), you’ll still need one of the newer Apple Watch models to make the most of watchOS 26’s upgrade to Smart Replies, which offers more precise and contextually-relevant messaging suggestions.
3. Automatic volume adjustmentSimilarly to Wrist Flick, automatic volume adjustment won’t be coming to models released pre-2023. This is a little disappointing, as it sounds like it would be a very handy function when it comes to managing noisy notifications.
With this new watchOS 26 feature, your Apple Watch will have the ability to ‘automatically adjust the speaker volume based on the ambient noise in a user’s surroundings for notifications, timers, alarms, incoming calls, and Siri’ – as it states in Apple’s press release.
4. Live Translation (Image credit: Apple)One of the biggest iOS 26 upgrades announced at WWDC 2025 was the addition of Apple Intelligence’s Live Translation function for iPhone, and now certain Apple Watch models are getting the same treatment.
With the arrival of watchOS 26, you’ll be able to view these right from your wrist – that’s if you own an Apple Watch Series 9, Apple Watch Series 10, or an Apple Watch Ultra 2.
5 features your older Apple Watch will receiveIf you have an Apple Watch Series 6 or later, or an Apple Watch SE 2, look out for these new features when watchOS 26 rolls out.
1. Liquid Glass (Image credit: Apple)Liquid Glass is one of the biggest upgrades coming with watchOS 26 – a huge operating system design upgrade that will roll out across all of Apple’s hardware. Not only will it give your interface a transparent and glossy look, but will make the use of small spaces by using expanding widgets.
The best part about this? You won’t have to worry about upgrading to a newer Apple Watch model for this new look, as it’s coming to Apple Watch Series 6 or later, Apple Watch SE 2, and all Apple Watch Ultra models.
2. Apple Intelligence Workout Buddy (Image credit: Jacob Krol / Future)watchOS 26 is also getting some upgrades on the fitness front, the main new addition being the Workout Buddy function. Powered by Apple Intelligence, Workout Buddy is a new experience in the Workout app that accesses the user's fitness, health, and workout history to provide spoken motivation and personalized fitness summaries.
You should note that to take advantage of Workout Buddy, you’ll also need an iPhone capable of supporting Apple Intelligence – those being models that support iOS 18.4 and later.
3. Notes on wrist (Image credit: Apple)One of the most asked-for features is the addition of the Notes app to watchOS, and if you have an Apple Watch Series 6 or above, you’ll soon be able to use Notes right from your wrist as nature intended.
Not only will you be able to access existing notes made on your iPhone, watchOS 26 will allow you to create new ones from your Apple Watch using Siri, dictation, and the keyboard function – and even complete checklists. Your grocery list can now live on your wrist!
4. Watch face ‘Hints’ in the Smart Stack (Image credit: Apple)With watchOS 26, new visual prompts called ‘Hints’ are coming to the watch face Smart Stack, which appears when you use the Digital Crown on the side of your watch to scroll.
Apple says Hints are designed to make your everyday interactions more convenient, offering the following examples of what to expect from its new addition: ‘A hint for Backtrack may appear when a user is in a remote location with no connectivity, or a hint for a Pilates workout may show up when a user arrives at a studio location at their usual time’.
5. Third-party control functionsThe final new feature coming to the wider group of watchOS 26-compatible models are new third-party controls, which will allow developers to create their own custom controls that Apple Watch users can add to their Control Center, Smart Stack widget, or Action Button.
When editing your Control Center, your Apple Watch will also show a ‘From your iPhone’ section, which will then allow you to add third-party controls found in your iPhone.
You might also like...