Blog Posts
-
Six Key Measures for Upholding Election Security and Integrity
Decision 2024 – the ultimate election year – is in full swing, with more than 60 countries holding national elections this cycle. In the United States, where presidential candidates are polling...
-
A New Era of Machine Identity Security: Welcome Venafi to CyberArk
We are thrilled to announce that we have completed the acquisition of Venafi, a recognized leader in machine identity management. This strategic move aligns with our commitment to not just...
-
Critical Access Controls: Ensuring Database Security
Securing database access has become a critical concern for organizations globally. Your organization’s data is its most valuable asset, encompassing everything about your business, partners,...
-
Zero Standing Privileges (ZSP): Vendor Myths vs. Reality
Several new vendors entering the privileged access management (PAM) market are boldly claiming they can – or will soon be able to – provide access with zero standing privileges (ZSP). In reality,...
-
DORA Compliance: A Security Wake-Up Call
The Clock is Ticking The Digital Operational Resilience Act (DORA) is about to shake things up in the EU, and if you’re not ready, it’s time to get moving. With the new regulations set to...
-
CIO POV: Impactful AI Programs Start with ‘Why’
Generative AI (GenAI) has the power to transform organizations from the inside out. Yet many organizations are struggling to prove the value of their GenAI investments after the initial push to...
-
LLMs Gone Wild: AI Without Guardrails
From the moment ChatGPT was released to the public, offensive actors started looking to use this new wealth of knowledge to further nefarious activities. Many of the controls we have become...
-
CyberArk Recognized as a Leader in 2024 Gartner® Magic Quadrant™ for PAM
Today, we’re exceptionally proud to announce our recognition as a Leader in the “2024 Gartner® Magic Quadrant™ for Privileged Access Management (PAM)”1 for the sixth time in a row. CyberArk was...
-
How Overreliance on EDR is Failing Healthcare Providers
Ransomware attacks have a profound impact on healthcare organizations, extending well beyond financial losses and the disrupted sleep of staff and shareholders. A University of Minnesota School of...
-
Taming Vault Sprawl with Modern Secrets Management
In this cloud, DevOps and AI era, security teams grapple with the growing challenge of shadow secrets and vault sprawl. As organizations scale, secrets management increasingly fragments. For...
-
Applying a ‘Three-Box Solution’ to Identity Security Strategies
Physical and network barriers that once separated corporate environments from the outside world no longer exist. In this new technological age defined by hybrid, multi-cloud and SaaS, identities...
-
The Rise of the Machines and the Growing AI Identity Attack Surface
In 1968, a killer supercomputer named HAL 9000 gripped imaginations in the sci-fi thriller “2001: A Space Odyssey.” The dark side of artificial intelligence (AI) was intriguing, entertaining and...
-
The Human Factor in a Tech-Driven World: Insights from the CrowdStrike Outage
AI and Deep Fake Technology v. The Human Element The idea that people are the weakest link has been a constant topic of discussion in cybersecurity conversations for years, and this may have been...
-
Zero Standing Privileges: The Essentials
In December, I’ll have been with CyberArk for seven years, and at a similar point, I’ll have spent two years leading product marketing for cloud security at the company. In my short tenure with...
-
CIO POV: CrowdStrike Incident Offers 3 Digital Resilience Lessons
On July 19, 2024, organizations around the world began to experience the “blue screen of death” in what would soon be considered one of the largest IT outages in history. Early rumors of a mass...
-
AI Treason: The Enemy Within
tl;dr: Large language models (LLMs) are highly susceptible to manipulation, and, as such, they must be treated as potential attackers in the system. LLMs have become extremely popular and serve...
-
Navigating Cloud Security: A Shared Responsibility
Each July, my family and I take a road trip from Kentucky back to my hometown in northwestern Pennsylvania to spend time on Lake Erie. As tradition dictates, we stop along I-71 for coffee at...
-
5 Strategies for Setting the Right Cybersecurity KPIs
Cybersecurity key performance indicators (KPIs) measure the efficacy of an organization’s cybersecurity program. In a rapidly changing threat landscape characterized by new identities,...
-
A Brief History of Game Cheating
Over the short span of video game cheating, both cheaters and game developers have evolved in many ways; this includes everything from modification of important game variables (like health) by...
-
Double Dipping Cheat Developer Gets Caught Red-Handed
Following our post “A Brief History of Game Cheating,” it’s safe to say that cheats, no matter how lucrative or premium they might look, always carry a degree of danger. Today’s story revolves...
- Loading More...