The CyberArk Blog
-
TLS Certificate Validity Cut to 47 Days: What You Need to Know
The CA/Browser Forum’s recent unanimous vote to reduce maximum public TLS certificate validity to just 47 days by March 2029 marks a seismic shift in the digital security landscape. This new...
-
CyberArk Named a Leader in the 2024 Gartner® Magic Quadrant™ for Privileged Access Management – again.
View the Report -
The Cybersecurity Investment Most Organizations Are Failing to Secure
Welcome to the 2025 Identity Security Landscape rollout—and to the “it’s complicated” phase of our relationship with AI. Each year, CyberArk surveys security leaders across the globe to understand...
-
Modern Cybersecurity Strategies for Linux Servers
Linux servers have become widely adopted across organizations of all sizes. However, the frustrations of integrating these servers have left organizations struggling to implement strong security...
-
Securing Identities for the Agentic AI Landscape
Twenty-five years ago, we set out to tackle one of the most challenging problems in identity security: Securing privileged access. Today, CyberArk takes another giant step forward, extending our...
-
Proactive Identity Security: Addressing Unmanaged Endpoint Risks
When an electrician comes to fix something in your house, you wouldn’t just hand over the keys and leave. Instead, you’d stay to supervise and ensure everything is done correctly. Similarly,...
-
Discovery Alone Is Not Enough: You Need Context to Secure Machine Identities
The digital landscape continues to undergo dramatic transformations. Long gone are the days when software, servers and infrastructure were monolithic and centralized. Today, organizations operate...
-
CIO POV: Identity and the Unbalanced Tension Between Attacker and Defender
Protecting a large enterprise is like playing goalkeeper in a soccer match. A CISO’s job is to keep the net clean while multiple attackers close in from various angles, aiming to score. No matter...
-
Quantum Chip Breakthroughs: Why Machine Identity Resilience Can’t Wait
Quantum computing isn’t just coming—it’s barreling toward us, flipping the rules of cybersecurity like a table in a bad action movie fight scene. And it begs the question every CISO and IT...
-
Enhancing Kubernetes Security: Strategies for Effective Secrets Management
Kubernetes powers modern application deployments, yet safeguarding its secrets remains a formidable challenge. In a 2024 report, IBM estimated that 16% of data breaches stemmed from compromised...
-
Lurking Threats in Post-Authentication Sessions
An attacker doesn’t need your password anymore. They don’t even need to break your MFA. They just need to get ahold of your session. And once they have it, they are you. Organizations have focused...
-
How CISOs Can Use Identity to Advance Zero Trust
AI is the best thing that’s ever happened to cybercriminals. It allows them to weaponize trust and launch identity-based attacks with staggering scale and sophistication. I’m talking about...
-
The Urgent Reality of Machine Identity Security in 2025
The importance of machine identity security has reached a critical juncture in 2025. With machine identities now far outnumbering human ones, securing these digital credentials has become a top...
-
The Rise of AI Agents—Collaborative Intelligence
2025 marks a pivotal moment. It’s the year AI agents transition from experimental technology to an essential business objective in enterprise operations that can enable growth and scale. These...
-
Workforce Passwordless Authentication: Beyond the Hype and Here to Stay
Let’s face it—passwords are a pain, especially for employees and contractors who deal with them daily. We all know that our so-called “secure” passwords often end up being something like...
-
The Agentic AI Revolution: 5 Unexpected Security Challenges
As we stand on the brink of the agentic AI revolution, it’s crucial to understand the profound impact AI agents will have on how people, applications and devices interact with systems and data....
-
What’s On the Horizon for AI Risk Management
Sam Altman’s recently published “Reflections” blog is one of those pieces that made me stop mid-scroll and wonder, “We’re really right in it, aren’t we?” Part think piece, part reality check, it’s...
-
CIO POV: Five Essential Themes Shaping the CIO’s Tech Agenda
Technology is rapidly redefining how we live and work. As CIO at CyberArk, I often get asked about the themes and realities shaping today’s tech agenda. Some of them—I’m looking at you, AI—are...
-
Deepfake Reality: My Experience as a Target
Cybersecurity has been my world for years. I’ve worked hard to build my reputation, moving from the hacker underground to a trusted boardroom expert. I take my role seriously because trust and...
-
Reshaping IGA for the Modern Enterprise: Welcome Zilla Security to CyberArk
This week, we announced an important development in our journey to deliver the industry’s most powerful, comprehensive identity security platform. CyberArk has acquired Zilla Security, a leader in...
-
Web-Based AI Agents: Unveiling the Emerging Insider Threat
The Rapid Rise of Web-Based AI Agents The introduction of OpenAI’s ‘Operator’ is a game changer for AI-driven automation. Currently designed for consumers, it’s only a matter of time before such...
-
Loading More...