The CyberArk Blog
-
The Urgent Reality of Machine Identity Security in 2025
The importance of machine identity security has reached a critical juncture in 2025. With machine identities now far outnumbering human ones, securing these digital credentials has become a top...
-
CyberArk Named a Leader in the 2024 Gartner® Magic Quadrant™ for Privileged Access Management – again.
View the Report -
The Rise of AI Agents—Collaborative Intelligence
2025 marks a pivotal moment. It’s the year AI agents transition from experimental technology to an essential business objective in enterprise operations that can enable growth and scale. These...
-
Workforce Passwordless Authentication: Beyond the Hype and Here to Stay
Let’s face it—passwords are a pain, especially for employees and contractors who deal with them daily. We all know that our so-called “secure” passwords often end up being something like...
-
The Agentic AI Revolution: 5 Unexpected Security Challenges
As we stand on the brink of the agentic AI revolution, it’s crucial to understand the profound impact AI agents will have on how people, applications and devices interact with systems and data....
-
What’s On the Horizon for AI Risk Management
Sam Altman’s recently published “Reflections” blog is one of those pieces that made me stop mid-scroll and wonder, “We’re really right in it, aren’t we?” Part think piece, part reality check, it’s...
-
CIO POV: Five Essential Themes Shaping the CIO’s Tech Agenda
Technology is rapidly redefining how we live and work. As CIO at CyberArk, I often get asked about the themes and realities shaping today’s tech agenda. Some of them—I’m looking at you, AI—are...
-
Deepfake Reality: My Experience as a Target
Cybersecurity has been my world for years. I’ve worked hard to build my reputation, moving from the hacker underground to a trusted boardroom expert. I take my role seriously because trust and...
-
Reshaping IGA for the Modern Enterprise: Welcome Zilla Security to CyberArk
This week, we announced an important development in our journey to deliver the industry’s most powerful, comprehensive identity security platform. CyberArk has acquired Zilla Security, a leader in...
-
Web-Based AI Agents: Unveiling the Emerging Insider Threat
The Rapid Rise of Web-Based AI Agents The introduction of OpenAI’s ‘Operator’ is a game changer for AI-driven automation. Currently designed for consumers, it’s only a matter of time before such...
-
Announcing CyberArk Application Access Manager — Secrets Management for Applications, Tools, Containers and DevOps
Learn how CyberArk Application Access Manager can help you control, manage and audit non-human privileged access for a wide range of applications across on-premises, hybrid and cloud environments.
-
Boost Cloud Security Without Bugging Your Developers
Developers are incredibly valuable to an organization’s progress and evolution. They must innovate quickly while simultaneously navigating changes to their day-to-day operations as companies...
-
DeepSeek DDoS: Why AI Needs Machine Identity Security
Imagine a sleek, high-tech sports car racing downhill without brakes. Now, imagine that car is actually the AI driving your business. Powerful yet precariously close to catastrophe. That’s why, as...
-
The Evolution of Fraud: How Deepfake Technology is Changing Cybercrime
As a former black hat hacker, social engineering and phishing concepts are not new to me. I have used these techniques in my previous life, so I know their effectiveness. Having spent years...
-
Modernize Your Directory Without Compromising Linux Security
In today’s threat landscape, you’re at risk if you don’t have all your identities—human and machine—secured with the right level of intelligent privilege controls. And the risk is even more...
-
Machine Identities Elevated: Insights from the White House Executive Order
Impact of the Executive Order on Software Supply Chain Security, AI and Machine Identities Cybersecurity is no longer just a niche issue tucked away in back-office conversations. It’s a...
-
The US Treasury Attack: Key Events and Security Implications
There’s a dark joke in cybersecurity: each year ends with an unwelcome holiday surprise—a major security incident. This timing isn’t random. Threat actors target this timing, knowing security...
-
Securing the Backbone of Enterprise GenAI
The rise of generative AI (GenAI) over the past two years has driven a whirlwind of innovation and a massive surge in demand from enterprises worldwide to utilize this transformative technology....
-
Prepare for 2025 Cyberthreats with Research Insights from CyberArk Labs
The year 2025 started with a bang, with these cybersecurity stories making headlines in the first few days: New details emerged on a “major” identity-related security incident involving the U.S....
-
How to Prepare for 90-Day TLS Certificate Lifespans with Automation
The discussion about managing the impact of shorter TLS certificate lifespans began with the proposal from Google to shorten the lifespan of public-facing certificates to 90 days. And then the...
-
7 Key Factors to Consider When Choosing a Modern PAM Solution in 2025
In 2025, global cybersecurity trends like the rise of Zero Trust, tightening data privacy and AI regulations and growing concerns over cloud security will only accelerate. Each of these evolving...
-
Loading More...