Blog Posts

  • Don’t Let Cybersecurity Cracks Become Major Breaches

    Don’t Let Cybersecurity Cracks Become Major Breaches

    Many major cybersecurity breaches can be traced back to the tiniest flaw. But as zero-day exploitations continue to make headlines and new vulnerabilities enter the National Vulnerability Database...

    Read Article
  • Cyber Insurance: How to Meet Requirements, Save Money and Reduce Risk

    Cyber Insurance: How to Meet Requirements, Save Money and Reduce Risk

    As the average cost of a data breach reaches a record high of $4.24 million, one successful zero-day exploit or ransomware attack has the potential to take down a business completely. Having cyber...

    Read Article
  • Gartner Names CyberArk a Leader in the 2021 Magic Quadrant for PAM

    Download Now
  • Ransomware Defense Best Practices

    Ransomware Defense Best Practices

    Ransomware has never been more prevalent — or profitable — than it is right now. What started as the exclusive domain of highly skilled and opportunistic bad actors has evolved into an underground...

    Read Article
  • The Cybersecurity Insider Threat “Among Us”

    The Cybersecurity Insider Threat “Among Us”

    Although created a few years before the world went into lockdown, something about the simple app-based game Among Us* truly tapped into the pandemic zeitgeist like nothing else. On the one hand,...

    Read Article
  • A Lesson on Higher Education Cybersecurity Risks 

    A Lesson on Higher Education Cybersecurity Risks 

    U.S.-based education institutions continue to grapple with major challenges brought by the pandemic: the largest enrollment decline seen in a decade, swirling controversy over reopening physical...

    Read Article
  • Ask These Questions Before Investing in Privileged Access Management

    Ask These Questions Before Investing in Privileged Access Management

    Identity and privileged access security challenges aren’t anything new — the pages of history are filled with tales of deception and fraud. During the Trojan War, the Greeks disguised their...

    Read Article
  • Fuzzing RDP: Holding the Stick at Both Ends

    Fuzzing RDP: Holding the Stick at Both Ends

    Introduction This post describes the work we’ve done on fuzzing the Windows RDP client and server, the challenges of doing so, and some of the results. The Remote Desktop Protocol (RDP) by...

    Read Article
  • CyberArk on AWS Marketplace: Driving Faster Time-to-Value for Customers and Partners

    CyberArk on AWS Marketplace: Driving Faster Time-to-Value for Customers and Partners

    Migrating workloads to the cloud is a top priority for many organizations, and businesses everywhere are using Amazon Web Services (AWS) to accelerate IT service agility, simplify operations and...

    Read Article
  • How Collaborative Cybersecurity Is Disrupting Disruption

    How Collaborative Cybersecurity Is Disrupting Disruption

    Out of a period of severe, real-world disruption came disruption’s polar opposite: cooperation. For a long time, cybersecurity seemed to be an area that needed to be shrouded in mystery. Don’t let...

    Read Article
  • Black Hat Reflections: Supply Chain Attacks, Zero Days and Disclosures

    Black Hat Reflections: Supply Chain Attacks, Zero Days and Disclosures

    Editor’s Note: Thanks to CyberArk Technical Evangelist Andy Thompson for authoring this post based on his experience at Black Hat 2021.  Black Hat 2021 had a markedly different tone from previous...

    Read Article
  • Living Off the Land Ransomware Attacks: A Step-By-Step Plan for Playing Defense

    Living Off the Land Ransomware Attacks: A Step-By-Step Plan for Playing Defense

    It’s been a staple of horror movies and espionage thrillers for years — the idea that something innocuous or trusted could suddenly turn against you. Unfortunately, what’s fodder for great fiction...

    Read Article
  • Introducing the CyberTalk with CyberArk Podcast Series: On-the-Go Cybersecurity Insights

    Introducing the CyberTalk with CyberArk Podcast Series: On-the-Go Cybersecurity Insights

    Ninety-one percent of cybersecurity practitioners agree they must keep up with their skills, or the organizations they work for are at a significant disadvantage against today’s cyber adversaries,...

    Read Article
  • Ransomware Protection, a Gold-Medal Team Approach

    Ransomware Protection, a Gold-Medal Team Approach

    If the cybersecurity industry was to adopt a motto, the Summer Games’ 2021 “Faster, Higher, Stronger — Together” adaptation should serve as inspiration. As high-profile ransomware attacks continue...

    Read Article
  • Stopping Cyber Threats with Unstoppable Innovation

    Stopping Cyber Threats with Unstoppable Innovation

    Several powerful and unforeseen market forces are driving the need for new, innovative approaches to combat evolving cyber threats. Central to achieving this critical mission is securing...

    Read Article
  • Reduce Cloud Compliance Risk with Least Privilege

    Reduce Cloud Compliance Risk with Least Privilege

    Meeting regulatory compliance requirements is one of global organizations’ top challenges as they scale cloud deployments and embrace multi-cloud strategies to drive business efficiencies. The...

    Read Article
  • FickerStealer: A New Rust Player in the Market

    FickerStealer: A New Rust Player in the Market

    This blog introduces a new information stealer, written in Rust and interestingly named FickerStealer. In this blog post, we provide an in-depth analysis of this new threat and its obfuscation...

    Read Article
  • 4 Risk-Based Steps for Securing Developers and Code

    4 Risk-Based Steps for Securing Developers and Code

    As software supply chain attacks surge in frequency and scale, it’s become apparent that cyber criminals are looking for stealthy ways to make malicious changes or inject malware into software —...

    Read Article
  • Bypassing Windows Hello Without Masks or Plastic Surgery

    Bypassing Windows Hello Without Masks or Plastic Surgery

    Biometric authentication is beginning to see rapid adoption across the enterprise as organizations look to incorporate passwordless solutions to help mitigate the numerous security risks inherent...

    Read Article
  • Attackers Are After Privileged Users. Do You Know Who They Are?

    Attackers Are After Privileged Users. Do You Know Who They Are?

    Attackers have more potential entry points into your organization than ever before. And many are brushing up on their acting skills, getting more creative and increasingly personal to spoof the...

    Read Article
  • In Kaseya Supply Chain Ransomware Attack History Repeats Itself

    In Kaseya Supply Chain Ransomware Attack History Repeats Itself

    While many Americans took off early to jump-start the Independence Day weekend, cyber attackers were launching the single biggest ransomware attack in history. It’s estimated that at least 800 to...

    Read Article
  • loading
    Loading More...