• Detect, Alert and Respond with CyberArk Privileged Threat Analytics

    How do advanced cyber attackers find their way to the heart of your enterprise? In 80 to 100 percent of attack sequences, the preferred pathway is the privileged account, as we’ve seen seen time and again in high-profile breaches from …

  • Cyber Security Experts Recommend Eight Ways to Reduce the Misuse of Privileged Accounts

    Last year, CyberArk issued a threat report: “Privileged Account Exploits Shift the Front Lines of Cyber Security.”  The key findings provide an excellent primer on the role of privileged accounts in targeted attacks. The full report is a must read …

  • Effective Behavior-based Defense

    By CyberArk Labs Analytics are a tricky business, no matter what purpose they’re applied to, let alone for use to stop a cyber-attack in progress. Take behavioral analytics, for example. What’s simply odd and what’s a threat? And if you’re …

  • Powering Up Threat Detection with Privileged Threat Analytics

    By John Worrall One of the most common and disturbing aspects of the data breaches and cyber-attacks we see on a weekly basis is that attackers typically are on the target company’s network for weeks, months and even years at …