• Application Credentials: The Hidden Attack Pathway into Your Organization

    Today, it’s well-understood that credentials belonging to IT administrators, business users, partners and others with high levels of network access are critical for gaining unauthorized access to key systems, and ultimately, the heart of the enterprise. As we’ve explored previously, …

  • The Other Insider Threat

    The trusted insider has always been a security risk – whether an executive with access to sensitive information or an administrator on an enterprise network. According to a recent report from the Ponemon Institute, 56 percent of security practitioners surveyed …

  • Effective Cyber Security Response: Test & Communicate Your Plan

    Organizations plan for success. They should also plan for worst case scenarios – especially in the case of a cyber attack or breach. For many organizations, preparedness means developing plans for disaster recovery and continuity of operations. As the cyber …

  • Lessons Learned from the Ukraine Blackout: 5 Best Practices for Locking Down Privileged Accounts

    CyberArk’s cybersecurity researcher Lavi Lazarovitz wrote about some of the key steps attackers took to cause a black out in the Ukraine. By examining the attack path, we’ve identified five best practices for locking down privileged access that when followed …