• Cyber Security Experts Recommend Eight Ways to Reduce the Misuse of Privileged Accounts

    Last year, CyberArk issued a threat report: “Privileged Account Exploits Shift the Front Lines of Cyber Security.”  The key findings provide an excellent primer on the role of privileged accounts in targeted attacks. The full report is a must read …

  • Introducing the CyberArk 2015 Global Advanced Threat Landscape Survey

    Today we unveiled the findings from our 2015 Global Advanced Threat Landscape Survey. Now in its ninth year, this report pinpoints cyber security trends and emerging risks based upon a compilation of interviews with 673 IT security and C-level executives …

  • Attack Origin: Does it Even Matter

    It’s been an exciting month keeping up with the latest cyber security breach! If you aren’t caught up, listen to this great recap by NPR. And CyberArk founder and CEO, Udi Mokady, joined the CNBC’s Squawk Box to point out …

  • The ‘Insider Threat’ is Privileged Access, not a Person

    By John Worrall The standard reply to “what is an insider threat,” generally circles around the concept of a bad apple within the company and this is shortsighted. Principal investigators in Oxford University’s Corporate Insider Threat Detection research program have …