Blog Posts
-
Boost Cloud Security Without Bugging Your Developers
Developers are incredibly valuable to an organization’s progress and evolution. They must innovate quickly while simultaneously navigating changes to their day-to-day operations as companies...
-
DeepSeek DDoS: Why AI Needs Machine Identity Security
Imagine a sleek, high-tech sports car racing downhill without brakes. Now, imagine that car is actually the AI driving your business. Powerful yet precariously close to catastrophe. That’s why, as...
-
The Evolution of Fraud: How Deepfake Technology is Changing Cybercrime
As a former black hat hacker, social engineering and phishing concepts are not new to me. I have used these techniques in my previous life, so I know their effectiveness. Having spent years...
-
Modernize Your Directory Without Compromising Linux Security
In today’s threat landscape, you’re at risk if you don’t have all your identities—human and machine—secured with the right level of intelligent privilege controls. And the risk is even more...
-
Machine Identities Elevated: Insights from the White House Executive Order
Impact of the Executive Order on Software Supply Chain Security, AI and Machine Identities Cybersecurity is no longer just a niche issue tucked away in back-office conversations. It’s a...
-
The US Treasury Attack: Key Events and Security Implications
There’s a dark joke in cybersecurity: each year ends with an unwelcome holiday surprise—a major security incident. This timing isn’t random. Threat actors target this timing, knowing security...
-
Securing the Backbone of Enterprise GenAI
The rise of generative AI (GenAI) over the past two years has driven a whirlwind of innovation and a massive surge in demand from enterprises worldwide to utilize this transformative technology....
-
Prepare for 2025 Cyberthreats with Research Insights from CyberArk Labs
The year 2025 started with a bang, with these cybersecurity stories making headlines in the first few days: New details emerged on a “major” identity-related security incident involving the U.S....
-
7 Key Factors to Consider When Choosing a Modern PAM Solution in 2025
In 2025, global cybersecurity trends like the rise of Zero Trust, tightening data privacy and AI regulations and growing concerns over cloud security will only accelerate. Each of these evolving...
-
CIO POV: Ransomware and Resilience—2024’s Biggest Cyber Stories
Let’s begin 2025 with an understatement about last year: 2024 was an eventful year for cybersecurity. That in itself is no surprise. The specifics, though, looked like this: AI use accelerated...
-
How to Prepare for 90-Day TLS Certificate Lifespans with Automation
The discussion about managing the impact of shorter TLS certificate lifespans began with the proposal from Google to shorten the lifespan of public-facing certificates to 90 days. And then the...
-
A White Hat’s 2024 Reflections: Cybersecurity Insights and Lessons
As 2024 comes to a close, today, I’m reflecting on some of the key events and trends that shaped my offensive security research this year. From publishing my first book to writing regular blogs on...
-
CIO POV: Beware of Deepfakes Infiltrating the Enterprise
Many years ago, the philosopher Phaedrus said, “Things are not always what they seem; the first appearance deceives many; the intelligence of a few perceives what has been carefully hidden.” He...
-
Teach Yourself Kubiscan in 7 Minutes (or Less…)
While Kubernetes’ Role-based access control (RBAC) authorization model is an essential part of securing Kubernetes, managing it has proven to be a significant challenge — especially when dealing...
-
Cloud Security Audits Explained: Challenges and Solutions
The cloud has enabled faster, more reliable and more scalable software delivery for organizations. Alongside these improvements come greater complexity and security considerations, all of which...
-
Discover Every Identity to Manage Cybersecurity Risk Effectively
Next time you’re outside on a clear night, look up at the stars and start counting. Chances are you’ll lose track, skip over some or completely forget where you started—there are just so many. Now...
-
Cybersecurity in 2025: Converging Identities, Private AIs and Autonomous APTs
2024 has proved historic for technology and cybersecurity—and we still have some distance from the finish line. We’ve witnessed everything from advancements in artificial intelligence (AI) and...
-
How CISOs Can Sharpen Their Board Pitch for IAM Buy-In
In a time when 94% of companies have experienced an identity-related breach, many CISOs feel the urgency to strengthen identity and access management (IAM) across their organizations. In fact, a...
-
ByteCodeLLM – Privacy in the LLM Era: Byte Code to Source Code
TL;DR ByteCodeLLM is a new open-source tool that harnesses the power of Local Large Language Models (LLMs) to decompile Python executables. Furthermore, and importantly, it prioritizes data...
-
Challenging the Access Management Status Quo
Once upon a time, workers sat in offices, only used corporate desktops and crossed a single authentication checkpoint to access company resources kept snugly behind a protective barrier. The world...
-
Loading More...