The CyberArk Blog
-
CyberArk at 25: Udi Mokady on Milestones, Identity Security and Humility
Let’s head back for a moment to when some of us were partying like it’s 1999, in 1999. Among that year’s notable milestones were the release of The Matrix, the introduction of the euro –...
-
CyberArk Named a Leader in the 2023 Gartner® Magic Quadrant™ for Privileged Access Management – again.
View the Report -
The Anatomy of Cloud Identity Security
There’s currently a cybersecurity adage with varying verbiage and claimed origins – the point, however, is unmistakable: “Attackers don’t break in. They log in.“ This saying underscores the...
-
Transforming Critical Infrastructure Security: The Power of Identity
In an era when every aspect of our society depends on reliable critical infrastructure, the role of identity security in safeguarding these essential services has never been more pivotal. With...
-
The Importance of Identity Security in Zero Trust Endpoint Defense
Identity security and Zero Trust have emerged as critical components in the defense against quickly evolving cyberthreats. Together, the solution and the approach support a default stance of...
-
The Role of FedRAMP in Federal Agency Digital Transformation and Cybersecurity
Not too long ago, when I was designing, building, operating and defending networks, the government organizations I worked with were burdened with many tasks related to deploying a new capability....
-
Defense-in-Depth for Secrets Management: Discovery, Visibility, Leak Detection and AI
In the past, many security teams considered securing secrets enough – if your secrets were secured, you were good. While you’re still kind-of-good staying on this course, security professionals...
-
The Knight in Shining Armor: Identity Security in Manufacturing Cybersecurity
In the throes of the Fourth Industrial Revolution, the manufacturing sector stands at the crossroads of groundbreaking innovation and an ever-growing shadow of cyberthreats. IT modernization has...
-
CIO POV: The Power of Cybersecurity Collaboration
You’ve undoubtedly heard Michael Jordon’s famous quote, “Talent wins games, but teamwork and intelligence win championships.” Jordan’s words encapsulate the fruition of team spirit and strategic...
-
Understanding APIs and How Attackers Abuse Them to Steal Data
Simply put, APIs (short for application programming interface) are how machines, cloud workloads, automation and other non-human entities communicate with one another. They also represent an...
-
Cookies Beyond Browsers: How Session-Based Attacks Are Evolving
In the past few years, we have witnessed a significant shift in the attack landscape, from stealing clear text credentials to targeting session-based authentication. This trend is driven by the...
-
How Secure is Automotive Digital Identity?
In the automotive industry’s fast lane, the fusion of digital innovation with vehicular engineering has revolutionized how we manufacture, drive and protect our vehicles. It also helps to ensure...
-
Election Security: Defending Democracy in Today’s Dynamic Cyber Threat Landscape
With over 50 countries heading to the polls this year, including major economies like the U.S., India and the U.K., 2024, one way or another, will be a defining year with over 4 billion voters...
-
Enterprise Browsers Need to Secure Identities Without Compromise
Now is the time. It’s been over 30 years since the introduction of the first web browser. Since then, the browser has evolved into an application that allows us to stream entertainment, work and...
-
CIO POV: What Makes a Good Neighbor in a Bad Cyber Neighborhood
“It’s discouraging to try to be a good neighbor in a bad neighborhood.” –William Castle This quote from the late American horror film director has recently been running through my head as I think...
-
CyberArk SaaS Solutions Achieve FedRAMP® High Authority
I’m honored to share that CyberArk is FedRAMP® High Authorized and ready to support U.S. federal agencies in securing access to critical government data and systems, meeting Zero Trust mandates...
-
How to Align Your Security Strategy with NIST Cybersecurity Framework 2.0
After a decade in the making – or waiting, as the case may be – the National Institute of Standards and Technology (NIST) has released the first major revision to its Cybersecurity Framework...
-
Why Identity Security Is Essential to Cybersecurity Strategy
In the modern digital landscape, cybersecurity isn’t just a technical challenge – it’s a business imperative. At the heart of cybersecurity is identity security – the principle that the right...
-
Why Your Organization Needs Dynamic Secrets and Rotation
In today’s rapidly evolving digital landscape, organizations confront a formidable array of cyber threats, with attacks and data breaches becoming increasingly prevalent. As businesses embrace...
-
How Time, Entitlements and Approvals (TEA) Can Secure the Keys to Your Cloud
A popular topic of conversation in my day-to-day work is how to secure privileged access to cloud management consoles and workloads. And that’s no surprise, considering more and more applications...
-
Why Machine Identities Are Essential Strands in Your Zero Trust Strategy
Just like a snagged strand can ruin your garment, overlooking the security of machine identities can tear the very fabric of Zero Trust that protects your organization from bad actors. As a quick...
- Loading More...