The CyberArk Blog

  • How to Align Your Security Strategy with NIST Cybersecurity Framework 2.0

    How to Align Your Security Strategy with NIST Cybersecurity Framework 2.0

    After a decade in the making – or waiting, as the case may be – the National Institute of Standards and Technology (NIST) has released the first major revision to its Cybersecurity Framework...

    Read Article
  • CyberArk Named a Leader in the 2023 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • Why Identity Security Is Essential to Cybersecurity Strategy

    Why Identity Security Is Essential to Cybersecurity Strategy

    In the modern digital landscape, cybersecurity isn’t just a technical challenge – it’s a business imperative. At the heart of cybersecurity is identity security – the principle that the right...

    Read Article
  • Why Your Organization Needs Dynamic Secrets and Rotation

    Why Your Organization Needs Dynamic Secrets and Rotation

    In today’s rapidly evolving digital landscape, organizations confront a formidable array of cyber threats, with attacks and data breaches becoming increasingly prevalent. As businesses embrace...

    Read Article
  • How Time, Entitlements and Approvals (TEA) Can Secure the Keys to Your Cloud

    How Time, Entitlements and Approvals (TEA) Can Secure the Keys to Your Cloud

    A popular topic of conversation in my day-to-day work is how to secure privileged access to cloud management consoles and workloads. And that’s no surprise, considering more and more applications...

    Read Article
  • Why Machine Identities Are Essential Strands in Your Zero Trust Strategy

    Why Machine Identities Are Essential Strands in Your Zero Trust Strategy

    Just like a snagged strand can ruin your garment, overlooking the security of machine identities can tear the very fabric of Zero Trust that protects your organization from bad actors. As a quick...

    Read Article
  • Enterprise Browser: The Gateway to Securing All Identities

    Enterprise Browser: The Gateway to Securing All Identities

    With new identities, environments and attack methods dominating today’s threat landscape, cybersecurity leaders are hyper-focused on securing identities to safeguard enterprises. However, a...

    Read Article
  • CIO POV: 3 Considerations as the 2024 Cyber Roller Coaster Gathers Speed

    CIO POV: 3 Considerations as the 2024 Cyber Roller Coaster Gathers Speed

    If the first month-plus of 2024 is any indication, this year is likely to be anything but ordinary in the cybersecurity realm. In January alone, a triad of events unfolded, each more riveting than...

    Read Article
  • APT29’s Attack on Microsoft: Tracking Cozy Bear’s Footprints

    APT29’s Attack on Microsoft: Tracking Cozy Bear’s Footprints

    A new and concerning chapter has unfolded in these troubled times of geopolitical chaos. The Cozy Bear threat actor has caused significant breaches targeting Microsoft and HPE, and more are likely...

    Read Article
  • Redefining PAM to Secure OT and IoT Devices

    Redefining PAM to Secure OT and IoT Devices

    Left to their own devices, your organization’s devices can be a significant source of risk. Consider operational technology (OT), which is crucial for organizations but is not engineered and...

    Read Article
  • Elevating Cloud Security With Well-Architected Practices

    Elevating Cloud Security With Well-Architected Practices

    It’s said that life truly begins when you step out of your comfort zone. Living in California provides me with many options for hiking and trekking, a perfect backdrop for spending time with...

    Read Article
  • GenAI’s Role in Upskilling to Close the Cybersecurity Skills Gap

    GenAI’s Role in Upskilling to Close the Cybersecurity Skills Gap

    The cybersecurity industry has a major people problem: it doesn’t have enough of them. The global shortage of more than 4 million cybersecurity workers isn’t a new phenomenon, but as digital and...

    Read Article
  • Why Identity Security Requires More Than ITDR

    Why Identity Security Requires More Than ITDR

    Identity Threat Detection and Response (ITDR) is one of many aspects of an effective identity security program. Yet despite what some detection and response-focused vendors may argue, ITDR is not...

    Read Article
  • 3 Things About 2023’s Threat Landscape That Shapes My 2024 CIO POV

    3 Things About 2023’s Threat Landscape That Shapes My 2024 CIO POV

    2023 was a tumultuous year that drove technology transformations at a pace unknown. The industry saw an accelerated and unrivaled pace of technology adoption, persistent yet evolving challenges...

    Read Article
  • Securing High-Risk Access with Reimagined PAM Controls: A Customer Story

    Securing High-Risk Access with Reimagined PAM Controls: A Customer Story

    My team and I were on a call with a customer who saw a critical need to secure access to his company’s cloud service provider (CSP) containers. Our conversation comes to mind often, because it...

    Read Article
  • CyberArk Labs’ 2023 Threat Research Highlights

    CyberArk Labs’ 2023 Threat Research Highlights

    Throughout an eventful 2023, CyberArk Labs remained focused on uncovering emerging cyberattack patterns and producing threat research aimed at helping organizations strengthen their identity...

    Read Article
  • Secure Identities With These Five Intelligent Privilege Controls

    Secure Identities With These Five Intelligent Privilege Controls

    If you’re reading this, a major part of your job is making the case for security-related issues you know are urgent. You may be among the 97% of CISOs being asked to present to their...

    Read Article
  • Why Intelligent Privilege Controls Are Essential for Identity Security

    Why Intelligent Privilege Controls Are Essential for Identity Security

     “If we can control identity, we can stop most modern attacks. And if you control identity, then you control every perimeter, application, container – effectively every part of the environment.” –...

    Read Article
  • Exploring the Risks of Read-Only Access in the Cloud

    Exploring the Risks of Read-Only Access in the Cloud

    My career began with read-only access. In my first job, I worked night shifts in a data operations center. Our team handled incidents identified either by monitoring or from end customers. This...

    Read Article
  • How to Meet Cyber Insurance Requirements When All Identities Are at Risk

    How to Meet Cyber Insurance Requirements When All Identities Are at Risk

    The growing frequency and sophistication of cyberattacks, especially on the ransomware front, have compelled even more companies to seek cyber insurance coverage. But as the need for coverage...

    Read Article
  • Why Ransomware Actors Abuse Legitimate Software

    Why Ransomware Actors Abuse Legitimate Software

    2023 was a lucrative year for ransomware actors, with victim organizations paying $449.1 million in the first six months alone. Maintaining this cash stream requires frequent technique shifts,...

    Read Article
  • loading
    Loading More...