• Keys to the IT Kingdom: Credentials and Lateral Movement

    We have a saying at CyberArk, “privilege first,” and it refers to security strategy. Nearly every advanced attack relies on privileged escalation to carry out the breach. Don’t believe me? Here’s a quick reference: Backoff-based retail breaches, UPS Store PoS …

  • Challenging Conventional Wisdom

    By John Worrall Every once in a while, people get shaken from their normal routines and have to question if what they’ve been doing is still relevant to their current situation. The raft of password-based cyber thefts for example, has …

  • Passwords14: The Dust Has Settled – What Did We Learn?

    By Shiri Licht Passwords14 is in the rearview mirror, yet the debate over how we handle passwords rages on. Should we accept weak passwords for trivial use? What action do we take in light of 1.2 billion passwords being stolen …

  • Robbing the Virtual Bank: Privileged Credentials to Blame

    The U.S. Consumer Financial Protection Bureau (CFFB) recently issued an advisory on the risk to consumers posed by virtual and cryptocurrencies, like Bitcoin. This warning from the CFFB couldn’t have come at a better time given the growing number of …

  • Thursday’s Black Hat Recap

    It’s over and we’re a bit sad to leave all the great conversations.  Before we head over to Defcon, we wanted to share some thoughts on Thursday’s Black Hat events. Privileged account security is on everyone’s radar as a critical …