Blog Posts

  • Why identity security is foundational for crypto agility in the post-quantum era

    Why identity security is foundational for crypto agility in the post-quantum era

    Cryptographic failures have a knack for turning a quiet weekend into a chaotic, all-hands-on-deck emergency. Consider the SHA-1 to SHA-2 deprecation, sometimes referred to as “Shapocalypse,” which...

    Read Blog
  • How autonomous AI agents like OpenClaw are reshaping enterprise identity security

    How autonomous AI agents like OpenClaw are reshaping enterprise identity security

    The viral surge of OpenClaw (formerly Clawdbot and Moltbot) has captured the tech world’s imagination, amassing over 160,000 GitHub stars and driving a hardware rush for Mac Minis to host these...

    Read Blog
  • Contain the SSO blast radius: Identity security beyond MFA

    Contain the SSO blast radius: Identity security beyond MFA

    Over the past week, multiple research teams have documented a renewed wave of voice-led social engineering (vishing) targeting identity providers and federated access. The entry point is not...

    Read Blog
  • AI agents are forcing a reckoning with identity and control

    AI agents are forcing a reckoning with identity and control

    Most organizations never planned for AI to start making real decisions. They started with simple helpers. An agent answered basic questions or generated small automations so teams could avoid...

    Read Blog
  • The art of the invisible key: Passkey global breakthrough

    The art of the invisible key: Passkey global breakthrough

    Introduction Passkeys now protects billions of accounts, redefining how the world signs in through stronger, more secure authentication without a password. Yet this global movement runs deeper...

    Read Blog
  • Chasing digital ghosts across modern IGA environments

    Chasing digital ghosts across modern IGA environments

    In Pac-Man, ghosts seem pretty easy to dodge. You’re clearing the maze, racking up points, three more pellets away from leveling up. Then, out of nowhere, they close in and cut off all hope of...

    Read Blog
  • CVE-2025-60021 (CVSS 9.8): command injection in Apache bRPC heap profiler

    CVE-2025-60021 (CVSS 9.8): command injection in Apache bRPC heap profiler

    This research is published following the public release of a fix and CVE, in accordance with coordinated vulnerability disclosure best practices. CVE‑2025‑60021, a critical command injection issue...

    Read Blog
  • Are we trusting AI too much?

    Are we trusting AI too much?

    Gone are the days when attackers had to break down doors. Now, they just log in with what look like legitimate credentials. This shift in tactics has been underway for a while, but the rapid...

    Read Blog
  • ServiceNow and CyberArk: New REST API integration for enhanced credential management

    ServiceNow and CyberArk: New REST API integration for enhanced credential management

    ServiceNow’s External Credential Storage and Management Application is designed to help organizations securely retrieve and manage credentials from external vaults during IT operations, like...

    Read Blog
  • The hidden cost of PKI: Why certificate failures aren’t just an IT problem

    The hidden cost of PKI: Why certificate failures aren’t just an IT problem

    For years, businesses have treated public key infrastructure (PKI) as background plumbing, quietly securing access across enterprise systems and devices, and rarely drawing executive attention...

    Read Blog
  • How the future of privilege is reshaping compliance

    How the future of privilege is reshaping compliance

    If privilege has changed, compliance can’t stay static. As organizations accelerate digital transformation, the compliance landscape is shifting beneath their feet—especially when it comes to how...

    Read Blog
  • CyberArk named overall leader in 2025 KuppingerCole ITDR Leadership Compass

    CyberArk named overall leader in 2025 KuppingerCole ITDR Leadership Compass

    KuppingerCole has recognized CyberArk identity threat detection and response (ITDR) as a leader across all categories: overall, product, innovation, and market in its 2025 KuppingerCole Leadership...

    Read Blog
  • What’s shaping the AI agent security market in 2026

    What’s shaping the AI agent security market in 2026

    For the past two years, AI agents have dominated boardroom conversations, product roadmaps, and investor decks. Companies made bold promises, tested early prototypes, and poured resources into...

    Read Blog
  • UNO reverse card: stealing cookies from cookie stealers

    UNO reverse card: stealing cookies from cookie stealers

    Criminal infrastructure often fails for the same reasons it succeeds: it is rushed, reused, and poorly secured. In the case of StealC, the thin line between attacker and victim turned out to be...

    Read Blog
  • Beneath the AI iceberg: The forces reshaping work and security

    Beneath the AI iceberg: The forces reshaping work and security

    In conversations about AI, there’s a tendency to treat the future like a horizon we’re walking toward, always somewhere ahead, always a question of when. But if we look closely, the forces...

    Read Blog
  • CyberArk Secure AI Agents: A closer look at new solution capabilities

    CyberArk Secure AI Agents: A closer look at new solution capabilities

    We are excited to announce the launch of CyberArk’s new solution for securing AI agents, which will be generally available at the end of December 2025. CyberArk Secure AI Agents will extend...

    Read Blog
  • Inside CyberArk Labs: the evolving risks in AI, browsers and OAuth

    Inside CyberArk Labs: the evolving risks in AI, browsers and OAuth

    In 2025, we saw attackers get bolder and smarter, using AI to amplify old tricks and invent new ones. The reality is, innovation cuts both ways. If you have tools, AI is going to make...

    Read Blog
  • Will AI agents ‘get real’ in 2026?

    Will AI agents ‘get real’ in 2026?

    In my house, we consume a lot of AI research. We also watch a lot—probably too much—TV. Late in 2025, those worlds collided when the AI giant Anthropic was featured on “60 Minutes.” My husband...

    Read Blog
  • Post-quantum identity security: Moving from risk to readiness

    Post-quantum identity security: Moving from risk to readiness

    Quantum computing sounds like something straight out of science fiction. It brings to mind images of impossibly powerful machines solving humanity’s biggest problems, from discovering new...

    Read Blog
  • Vibe check your vibe code: Adding human judgment to AI-driven development

    Vibe check your vibe code: Adding human judgment to AI-driven development

    Remember when open meant visible? When a bug in open-source code left breadcrumbs you could audit? When you could trace commits, contributors, timestamps, even heated 2:13 a.m. debates on tabs...

    Read Blog
  • loading
    Loading More...