Blog Posts

  • Who’s Responsible for Your Security?

    Who’s Responsible for Your Security?

    Antivirus, malware protection, email security, EDR, XDR, next-generation firewalls, AI-enabled analytics – the list of protective controls and vendors appears to go on forever. Each day, bad...

    Read Blog
  • Six Key Measures for Upholding Election Security and Integrity

    Six Key Measures for Upholding Election Security and Integrity

    Decision 2024 – the ultimate election year – is in full swing, with more than 60 countries holding national elections this cycle. In the United States, where presidential candidates are polling...

    Read Blog
  • A New Era of Machine Identity Security: Welcome Venafi to CyberArk

    A New Era of Machine Identity Security: Welcome Venafi to CyberArk

    We are thrilled to announce that we have completed the acquisition of Venafi, a recognized leader in machine identity management. This strategic move aligns with our commitment to not just...

    Read Blog
  • Critical Access Controls: Ensuring Database Security

    Critical Access Controls: Ensuring Database Security

    Securing database access has become a critical concern for organizations globally. Your organization’s data is its most valuable asset, encompassing everything about your business, partners,...

    Read Blog
  • Zero Standing Privileges (ZSP): Vendor Myths vs. Reality

    Zero Standing Privileges (ZSP): Vendor Myths vs. Reality

    Several new vendors entering the privileged access management (PAM) market are boldly claiming they can – or will soon be able to – provide access with zero standing privileges (ZSP). In reality,...

    Read Blog
  • DORA Compliance: A Security Wake-Up Call

    DORA Compliance: A Security Wake-Up Call

    The Clock is Ticking The Digital Operational Resilience Act (DORA) is about to shake things up in the EU, and if you’re not ready, it’s time to get moving. With the new regulations set to...

    Read Blog
  • CIO POV: Impactful AI Programs Start with ‘Why’

    CIO POV: Impactful AI Programs Start with ‘Why’

    Generative AI (GenAI) has the power to transform organizations from the inside out. Yet many organizations are struggling to prove the value of their GenAI investments after the initial push to...

    Read Blog
  • LLMs Gone Wild: AI Without Guardrails

    LLMs Gone Wild: AI Without Guardrails

    From the moment ChatGPT was released to the public, offensive actors started looking to use this new wealth of knowledge to further nefarious activities. Many of the controls we have become...

    Read Blog
  • CyberArk Recognized as a Leader in 2024 Gartner® Magic Quadrant™ for PAM

    CyberArk Recognized as a Leader in 2024 Gartner® Magic Quadrant™ for PAM

    Today, we’re exceptionally proud to announce our recognition as a Leader in the “2024 Gartner® Magic Quadrant™ for Privileged Access Management (PAM)”1 for the sixth time in a row. CyberArk was...

    Read Blog
  • How Overreliance on EDR is Failing Healthcare Providers

    How Overreliance on EDR is Failing Healthcare Providers

    Ransomware attacks have a profound impact on healthcare organizations, extending well beyond financial losses and the disrupted sleep of staff and shareholders. A University of Minnesota School of...

    Read Blog
  • Taming Vault Sprawl with Modern Secrets Management

    Taming Vault Sprawl with Modern Secrets Management

    In this cloud, DevOps and AI era, security teams grapple with the growing challenge of shadow secrets and vault sprawl. As organizations scale, secrets management increasingly fragments. For...

    Read Blog
  • Applying a ‘Three-Box Solution’ to Identity Security Strategies

    Applying a ‘Three-Box Solution’ to Identity Security Strategies

    Physical and network barriers that once separated corporate environments from the outside world no longer exist. In this new technological age defined by hybrid, multi-cloud and SaaS, identities...

    Read Blog
  • The Rise of the Machines and the Growing AI Identity Attack Surface

    The Rise of the Machines and the Growing AI Identity Attack Surface

    In 1968, a killer supercomputer named HAL 9000 gripped imaginations in the sci-fi thriller “2001: A Space Odyssey.” The dark side of artificial intelligence (AI) was intriguing, entertaining and...

    Read Blog
  • The Human Factor in a Tech-Driven World: Insights from the CrowdStrike Outage

    The Human Factor in a Tech-Driven World: Insights from the CrowdStrike Outage

    AI and Deep Fake Technology v. The Human Element The idea that people are the weakest link has been a constant topic of discussion in cybersecurity conversations for years, and this may have been...

    Read Blog
  • Zero Standing Privileges: The Essentials

    Zero Standing Privileges: The Essentials

    In December, I’ll have been with CyberArk for seven years, and at a similar point, I’ll have spent two years leading product marketing for cloud security at the company. In my short tenure with...

    Read Blog
  • CIO POV: CrowdStrike Incident Offers 3 Digital Resilience Lessons

    CIO POV: CrowdStrike Incident Offers 3 Digital Resilience Lessons

    On July 19, 2024, organizations around the world began to experience the “blue screen of death” in what would soon be considered one of the largest IT outages in history. Early rumors of a mass...

    Read Blog
  • AI Treason: The Enemy Within

    AI Treason: The Enemy Within

    tl;dr: Large language models (LLMs) are highly susceptible to manipulation, and, as such, they must be treated as potential attackers in the system. LLMs have become extremely popular and serve...

    Read Blog
  • Navigating Cloud Security: A Shared Responsibility

    Navigating Cloud Security: A Shared Responsibility

    Each July, my family and I take a road trip from Kentucky back to my hometown in northwestern Pennsylvania to spend time on Lake Erie. As tradition dictates, we stop along I-71 for coffee at...

    Read Blog
  • 5 Strategies for Setting the Right Cybersecurity KPIs

    5 Strategies for Setting the Right Cybersecurity KPIs

    Cybersecurity key performance indicators (KPIs) measure the efficacy of an organization’s cybersecurity program. In a rapidly changing threat landscape characterized by new identities,...

    Read Blog
  • A Brief History of Game Cheating

    A Brief History of Game Cheating

    Over the short span of video game cheating, both cheaters and game developers have evolved in many ways; this includes everything from modification of important game variables (like health) by...

    Read Blog
  • loading
    Loading More...