• Fundamental Endpoint Security Best Practice: Securing Privilege on the Endpoint

    Information security professionals know there are two fundamental endpoint security practices that should be part of their security program in order to reduce the attack surface. Validated by various government information security organizations and industry analysts, the first practice is …

  • Introducing CyberArk Endpoint Privilege Manager

    Information security professionals recognize that cyber attackers will exploit endpoint vulnerabilities and then make a beeline for privileged credentials. As a result, organizations are evaluating how they can take steps to secure privilege on the endpoint as a fundamental part …

  • New CyberArk Labs Research: Analyzing Ransomware and Potential Mitigation Strategies

    Reports of ransomware attacks continue to escalate, as we’ve explored in recent posts. The FBI reported that cyber criminals used ransomware to extort $209 million from enterprise organizations in the first three months of 2016 alone. This form of malware …