Cyber Security Experts Recommend Eight Ways to Reduce the Misuse of Privileged Accounts

Last year, CyberArk issued a threat report: “Privileged Account Exploits Shift the Front Lines of Cyber Security.”  The key findings provide an excellent primer on the role of privileged accounts in targeted attacks. The full…

Privileged Credentials in COTS Applications: What IT Pros and Their Application Providers Need to Know Now

Organizations recognize the importance of locking down privileged account access. As they proactively build enterprise-wide security programs, they also increasingly understand this access is not limited to users with a “heart beat.” Third party, commercial…