• Analyze This: How IP Addresses Can Save the Day

    By CyberArk Labs Everyone in the security business is talking about analytics – threat intelligence, big data, mining, etc. Clearly, sifting through huge amounts of data has significant value for understanding the complex nature of IT infrastructure and advanced cyber …

  • Effective Behavior-based Defense

    By CyberArk Labs Analytics are a tricky business, no matter what purpose they’re applied to, let alone for use to stop a cyber-attack in progress. Take behavioral analytics, for example. What’s simply odd and what’s a threat? And if you’re …

  • Powering Up Threat Detection with Privileged Threat Analytics

    By John Worrall One of the most common and disturbing aspects of the data breaches and cyber-attacks we see on a weekly basis is that attackers typically are on the target company’s network for weeks, months and even years at …

  • Fighting Back Against Targeted Attacks

    By John Worrall Energy and oil companies in Norway have been facing what local security authorities are calling, “the biggest targeted cyber-attack ever on local companies.” These attacks are very similar to multiple attacks on critical infrastructure companies here in …

  • Keys to the IT Kingdom: Credentials and Lateral Movement

    We have a saying at CyberArk, “privilege first,” and it refers to security strategy. Nearly every advanced attack relies on privileged escalation to carry out the breach. Don’t believe me? Here’s a quick reference: Backoff-based retail breaches, UPS Store PoS …