• Shamoon Attack Reinforces Risks of Privileged Credential Compromise

    Malware like Shamoon is analogous to finding an unexploded WWII bomb in the ground. It’s been seemingly dormant for years, but when uncovered, it remains incredibly dangerous with the potential to devastate. Agile cyber attackers have become expert at reconstituting …

  • Cyber Security: Don’t Ignore Data Integrity

    Cyber security is an enabler of the digital transformation of business. While Information Technology allows the rapid delivery of goods and services and the real-time understanding of customers, markets and industries, security enables companies to use technology by ensuring that …

  • Cyber Security Nightmares

    Cyber attackers pose a number of “scary” situations for IT security professionals. Attack vectors change, new threats emerge and staying on top of best practices can be a challenge.  In the CyberArk Global Advanced Threat Landscape Survey 2016, respondents were …