The CyberArk Blog

  • You’ve Enabled MFA — Great! This Cybersecurity Awareness Month, Focus on How and Where It’s Used

    You’ve Enabled MFA — Great! This Cybersecurity Awareness Month, Focus on How and Where It’s Used

    Decades ago, the internet was built to give people a way to access and share information fast. What it wasn’t built for was safety, which is how we ended up with an entire month dedicated...

    Read Article
  • CyberArk Named a Leader in the 2022 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • This Cybersecurity Awareness Month, Set Your Identity Security Strategy to Master Cyber Fundamentals  

    This Cybersecurity Awareness Month, Set Your Identity Security Strategy to Master Cyber Fundamentals  

    As Cybersecurity Awareness Month (CSAM) begins this October, government and private organizations in the United States, the European Union and around the world are promoting safe and secure...

    Read Article
  • Trust Issues Podcast Playback: Udi Mokady on Identity Security’s Impact

    Trust Issues Podcast Playback: Udi Mokady on Identity Security’s Impact

    The productivity secrets of highly effective leaders fascinate me – how they’re able to juggle numerous responsibilities, while still finding time to sharpen their skills. Everyone gets the same...

    Read Article
  • 5 Defense-in-Depth Layers for Enabling Secure Access  

    5 Defense-in-Depth Layers for Enabling Secure Access  

    Cybersecurity is one of many industries that love jargon. As in the medical and legal professions, complex topics often get crunched into digestible phrases, with the “stickiest” of terms...

    Read Article
  • Unpacking the Uber Breach

    Unpacking the Uber Breach

    In the days following the September 15 Uber breach disclosure, much has been written about how one, allegedly 18-year-old attacker was able to successfully infiltrate the ridesharing giant’s IT...

    Read Article
  • Why and How Federal Agencies Need to Improve Their FITARA Scorecard

    Why and How Federal Agencies Need to Improve Their FITARA Scorecard

    In a big, highly anticipated move, last week the White House introduced new cybersecurity guidance to harden federal networks and advance key priorities outlined in President Biden’s May 2021...

    Read Article
  • K-12 Schools in the Crosshairs of Ransomware

    K-12 Schools in the Crosshairs of Ransomware

    If staggering staffing shortages, razor-thin budgets, safety issues and politically driven controversies weren’t enough to contend with, U.S. schools are facing another major crisis: skyrocketing...

    Read Article
  • Cybersecurity Basics Build on Fundamental Childhood Lessons

    Cybersecurity Basics Build on Fundamental Childhood Lessons

    The human brain grows at an incredible rate during childhood, forming trillions of connections and absorbing information like a sponge. As we grow up, the impact of early life lessons tends to...

    Read Article
  • Decentralized Identity on the Blockchain Promises a New Era of Consumer Privacy. But Can It Deliver?

    Decentralized Identity on the Blockchain Promises a New Era of Consumer Privacy. But Can It Deliver?

    What is my identity? I’m not having an existential moment; instead, I’m asking how others recognize me. How do they know for sure that I am who I say I am? In the physical world,...

    Read Article
  • LockBit 3.0 Ransomware Learns from Defenders, Launches Bug Bounty Program, Begs “Hack Me”

    LockBit 3.0 Ransomware Learns from Defenders, Launches Bug Bounty Program, Begs “Hack Me”

    The evolution of LockBit – one of the largest ransomware as a service (RaaS) operations in history – exemplifies continued attack commoditization and underground innovation. Since LockBit 3.0 (aka...

    Read Article
  • Identity Security in Action at Diamond Trust Bank

    Identity Security in Action at Diamond Trust Bank

    For more than 70 years, customers in East Africa have trusted Diamond Trust Bank (DTB) for their banking needs. Listed on the Nairobi Securities Exchange (NSE), the leading regional bank is an...

    Read Article
  • Don’t Fall for MFA Fatigue or Next-Level Phishing Attacks

    Don’t Fall for MFA Fatigue or Next-Level Phishing Attacks

    Phishing attacks are pervasive, whether you work at a global telecommunications company or a small local retail shop. Fortunately, employees have come a long way in spotting phishing attempts,...

    Read Article
  • Identity Security: Putting It All Together

    Identity Security: Putting It All Together

    Here at CyberArk, we’ve been sharing how Identity Security offers a modern approach grounded in Zero Trust and least privilege to protect organizations’ most critical assets. In recent weeks,...

    Read Article
  • CyberArk Acquires C3M, Accelerating Cloud Privilege Security and Cyber Risk Reduction

    CyberArk Acquires C3M, Accelerating Cloud Privilege Security and Cyber Risk Reduction

    In 2018, as cloud adoption was nearing a tipping point, and a series of major cyber attacks signaled the rise of the cloud service misconfiguration error, we founded C3M on the belief that cloud...

    Read Article
  • 6 Identity Security Soundbites from David Higgins, CyberArk EMEA Technical Director

    6 Identity Security Soundbites from David Higgins, CyberArk EMEA Technical Director

    CyberArk EMEA Technical Director David Higgins works closely with some of the world’s largest and most heavily regulated organizations in architecting Identity Security strategies that help...

    Read Article
  • 5 Hot Takes from AWS re:Inforce 2022

    5 Hot Takes from AWS re:Inforce 2022

    The city of Boston was hot this July – and we’re not just talking about record-breaking temperatures. The cybersecurity community showed up and turned up the heat, exploring Identity...

    Read Article
  • 9 Reasons to Simplify Secrets Management

    9 Reasons to Simplify Secrets Management

    Eighty-seven percent of IT decision-makers1 say their organizations are implementing DevOps, yet achieving DevSecOps excellence isn’t easy, especially as machine identities and secrets continue to...

    Read Article
  • CyberArk Named a Leader in the 2022 Gartner® Magic Quadrant™ for PAM Again

    CyberArk Named a Leader in the 2022 Gartner® Magic Quadrant™ for PAM Again

    CyberArk is proud to announce it has been named a Leader in the 2022 Gartner® Magic Quadrant™ for Privileged Access Management.1 The company was positioned both highest in ability to execute and...

    Read Article
  • What to Do When Digital Identities Start Doing “Stranger Things”

    What to Do When Digital Identities Start Doing “Stranger Things”

    The long-awaited volume 2 of “Stranger Things” season 4 dropped this month. Fellow fans likely tracked three unique storylines this season, and it was a good thing the last two episodes were...

    Read Article
  • IMPACTful Women in Cybersecurity

    IMPACTful Women in Cybersecurity

    While cybersecurity as an industry aims to close gaps, cybersecurity as a profession has notoriously struggled with its own gaps when it comes to representation. When examining gender diversity...

    Read Article
  • loading
    Loading More...