Blog Posts

  • Trust Issues Podcast Playback: Udi Mokady on Identity Security’s Impact

    Trust Issues Podcast Playback: Udi Mokady on Identity Security’s Impact

    The productivity secrets of highly effective leaders fascinate me – how they’re able to juggle numerous responsibilities, while still finding time to sharpen their skills. Everyone gets the same...

    Read Article
  • 5 Defense-in-Depth Layers for Enabling Secure Access  

    5 Defense-in-Depth Layers for Enabling Secure Access  

    Cybersecurity is one of many industries that love jargon. As in the medical and legal professions, complex topics often get crunched into digestible phrases, with the “stickiest” of terms...

    Read Article
  • Unpacking the Uber Breach

    Unpacking the Uber Breach

    In the days following the September 15 Uber breach disclosure, much has been written about how one, allegedly 18-year-old attacker was able to successfully infiltrate the ridesharing giant’s IT...

    Read Article
  • Why and How Federal Agencies Need to Improve Their FITARA Scorecard

    Why and How Federal Agencies Need to Improve Their FITARA Scorecard

    In a big, highly anticipated move, last week the White House introduced new cybersecurity guidance to harden federal networks and advance key priorities outlined in President Biden’s May 2021...

    Read Article
  • K-12 Schools in the Crosshairs of Ransomware

    K-12 Schools in the Crosshairs of Ransomware

    If staggering staffing shortages, razor-thin budgets, safety issues and politically driven controversies weren’t enough to contend with, U.S. schools are facing another major crisis: skyrocketing...

    Read Article
  • Cybersecurity Basics Build on Fundamental Childhood Lessons

    Cybersecurity Basics Build on Fundamental Childhood Lessons

    The human brain grows at an incredible rate during childhood, forming trillions of connections and absorbing information like a sponge. As we grow up, the impact of early life lessons tends to...

    Read Article
  • Decentralized Identity on the Blockchain Promises a New Era of Consumer Privacy. But Can It Deliver?

    Decentralized Identity on the Blockchain Promises a New Era of Consumer Privacy. But Can It Deliver?

    What is my identity? I’m not having an existential moment; instead, I’m asking how others recognize me. How do they know for sure that I am who I say I am? In the physical world,...

    Read Article
  • LockBit 3.0 Ransomware Learns from Defenders, Launches Bug Bounty Program, Begs “Hack Me”

    LockBit 3.0 Ransomware Learns from Defenders, Launches Bug Bounty Program, Begs “Hack Me”

    The evolution of LockBit – one of the largest ransomware as a service (RaaS) operations in history – exemplifies continued attack commoditization and underground innovation. Since LockBit 3.0 (aka...

    Read Article
  • Identity Security in Action at Diamond Trust Bank

    Identity Security in Action at Diamond Trust Bank

    For more than 70 years, customers in East Africa have trusted Diamond Trust Bank (DTB) for their banking needs. Listed on the Nairobi Securities Exchange (NSE), the leading regional bank is an...

    Read Article
  • Don’t Fall for MFA Fatigue or Next-Level Phishing Attacks

    Don’t Fall for MFA Fatigue or Next-Level Phishing Attacks

    Phishing attacks are pervasive, whether you work at a global telecommunications company or a small local retail shop. Fortunately, employees have come a long way in spotting phishing attempts,...

    Read Article
  • Identity Security: Putting It All Together

    Identity Security: Putting It All Together

    Here at CyberArk, we’ve been sharing how Identity Security offers a modern approach grounded in Zero Trust and least privilege to protect organizations’ most critical assets. In recent weeks,...

    Read Article
  • CyberArk Acquires C3M, Accelerating Cloud Privilege Security and Cyber Risk Reduction

    CyberArk Acquires C3M, Accelerating Cloud Privilege Security and Cyber Risk Reduction

    In 2018, as cloud adoption was nearing a tipping point, and a series of major cyber attacks signaled the rise of the cloud service misconfiguration error, we founded C3M on the belief that cloud...

    Read Article
  • 6 Identity Security Soundbites from David Higgins, CyberArk EMEA Technical Director

    6 Identity Security Soundbites from David Higgins, CyberArk EMEA Technical Director

    CyberArk EMEA Technical Director David Higgins works closely with some of the world’s largest and most heavily regulated organizations in architecting Identity Security strategies that help...

    Read Article
  • 5 Hot Takes from AWS re:Inforce 2022

    5 Hot Takes from AWS re:Inforce 2022

    The city of Boston was hot this July – and we’re not just talking about record-breaking temperatures. The cybersecurity community showed up and turned up the heat, exploring Identity...

    Read Article
  • Inside Matanbuchus: A Quirky Loader

    Inside Matanbuchus: A Quirky Loader

    An in-depth analysis of Matanbuchus loader’s tricks and loading techniques Matanbuchus is a Malware-as-a-Service loader that has been sold on underground markets for more than one year....

    Read Article
  • CyberArk Named a Leader in the 2022 Gartner® Magic Quadrant™ for PAM Again

    CyberArk Named a Leader in the 2022 Gartner® Magic Quadrant™ for PAM Again

    CyberArk is proud to announce it has been named a Leader in the 2022 Gartner® Magic Quadrant™ for Privileged Access Management.1 The company was positioned both highest in ability to execute and...

    Read Article
  • What to Do When Digital Identities Start Doing “Stranger Things”

    What to Do When Digital Identities Start Doing “Stranger Things”

    The long-awaited volume 2 of “Stranger Things” season 4 dropped this month. Fellow fans likely tracked three unique storylines this season, and it was a good thing the last two episodes were...

    Read Article
  • IMPACTful Women in Cybersecurity

    IMPACTful Women in Cybersecurity

    While cybersecurity as an industry aims to close gaps, cybersecurity as a profession has notoriously struggled with its own gaps when it comes to representation. When examining gender diversity...

    Read Article
  • Live from Impact 2022: Identity Security Trends, Investment and New Innovations

    Live from Impact 2022: Identity Security Trends, Investment and New Innovations

    The cybersecurity and identity-focused professionals gathered at CyberArk Impact 2022 need little convincing that Zero Trust is a solid framework to follow. After all, they’re the ones grappling...

    Read Article
  • Cyber Attack Commoditization and the Rise of Access-as-a-Service

    Cyber Attack Commoditization and the Rise of Access-as-a-Service

    Despite lingering, dated depictions of dark-hooded figures, cyber crime has matured into a highly professional business sector. With strong backing by organized crime syndicates and nation states,...

    Read Article
  • loading
    Loading More...