The CyberArk Blog

  • CIO POV: Building Resilience in a Complex Threat Landscape

    CIO POV: Building Resilience in a Complex Threat Landscape

    As a CIO, I often wish for a world where the threat landscape is less expansive and complicated than it is today. Unfortunately, the reality is quite different. This month, I find myself...

    Read Article
  • CyberArk Named a Leader in the 2023 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • Securing a Lifeline: Why Identity Security is Paramount in Healthcare

    Securing a Lifeline: Why Identity Security is Paramount in Healthcare

    In the intricate healthcare ecosystem, cybersecurity is akin to the human immune system – a vital defense that safeguards the body from external and internal threats. Healthcare cybersecurity is...

    Read Article
  • Triage Your Cloud Security: Risk Prioritization Methods

    Triage Your Cloud Security: Risk Prioritization Methods

    It’s a familiar post-disaster scene in seemingly every television medical drama. A ferry has crashed, or a train has derailed. Patients flood into the ER, each requiring urgent medical attention....

    Read Article
  • Synchronized Swimming: The Relationship Between Privacy and Cybersecurity Teams

    Synchronized Swimming: The Relationship Between Privacy and Cybersecurity Teams

    Data theft, data protection and the leakage of passwords or secrets are the top two cloud security concerns for 2,400 cybersecurity experts, according to the recently released CyberArk 2024...

    Read Article
  • IMPACT 2024: It’s Time for a Paradigm Shift in Identity Security

    IMPACT 2024: It’s Time for a Paradigm Shift in Identity Security

    What a week! We just wrapped up CyberArk IMPACT 2024, the world’s largest identity security-focused conference. It was amazing to be joined by thought leaders and practitioners from around the...

    Read Article
  • The Future of Identity Security: Insights from CyberArk IMPACT 24

    The Future of Identity Security: Insights from CyberArk IMPACT 24

    CyberArk IMPACT 24 in Nashville was a week packed with firsts for me: My first time in Nashville. My first time at our flagship global event. My first time being involved in a genuinely significant...

    Read Article
  • Predicting the Future of AI in Identity and Access Management

    Predicting the Future of AI in Identity and Access Management

    In the rapidly changing cybersecurity landscape, Identity and Access Management (IAM) is a critical pillar, safeguarding organizational data and access across different enterprise systems and...

    Read Article
  • The Growing Threat of Identity-Related Cyberattacks: Insights Into the Threat Landscape

    The Growing Threat of Identity-Related Cyberattacks: Insights Into the Threat Landscape

    The last 12 months have witnessed a rapid-fire round of innovation and adoption of new technologies. Powerful new identities, environments and attack methods are shaping the quickly changing...

    Read Article
  • CIO POV: Navigating the Deepfake Pandemic with Proactive Measures

    CIO POV: Navigating the Deepfake Pandemic with Proactive Measures

    We’re in the throes of another pandemic, but this time, it’s not transmitted through the air – it spreads with just a click. Welcome to the world of deepfakes. While COVID-19 significantly...

    Read Article
  • CyberArk at 25: Udi Mokady on Milestones, Identity Security and Humility

    CyberArk at 25: Udi Mokady on Milestones, Identity Security and Humility

    Let’s head back for a moment to when some of us were partying like it’s 1999, in 1999. Among that year’s notable milestones were the release of The Matrix, the introduction of the euro –...

    Read Article
  • The Anatomy of Cloud Identity Security

    The Anatomy of Cloud Identity Security

    There’s currently a cybersecurity adage with varying verbiage and claimed origins – the point, however, is unmistakable: “Attackers don’t break in. They log in.“ This saying underscores the...

    Read Article
  • Transforming Critical Infrastructure Security: The Power of Identity

    Transforming Critical Infrastructure Security: The Power of Identity

    In an era when every aspect of our society depends on reliable critical infrastructure, the role of identity security in safeguarding these essential services has never been more pivotal. With...

    Read Article
  • The Importance of Identity Security in Zero Trust Endpoint Defense

    The Importance of Identity Security in Zero Trust Endpoint Defense

    Identity security and Zero Trust have emerged as critical components in the defense against quickly evolving cyberthreats. Together, the solution and the approach support a default stance of...

    Read Article
  • The Role of FedRAMP in Federal Agency Digital Transformation and Cybersecurity

    The Role of FedRAMP in Federal Agency Digital Transformation and Cybersecurity

    Not too long ago, when I was designing, building, operating and defending networks, the government organizations I worked with were burdened with many tasks related to deploying a new capability....

    Read Article
  • Defense-in-Depth for Secrets Management: Discovery, Visibility, Leak Detection and AI

    Defense-in-Depth for Secrets Management: Discovery, Visibility, Leak Detection and AI

    In the past, many security teams considered securing secrets enough – if your secrets were secured, you were good. While you’re still kind-of-good staying on this course, security professionals...

    Read Article
  • The Knight in Shining Armor: Identity Security in Manufacturing Cybersecurity

    The Knight in Shining Armor: Identity Security in Manufacturing Cybersecurity

    In the throes of the Fourth Industrial Revolution, the manufacturing sector stands at the crossroads of groundbreaking innovation and an ever-growing shadow of cyberthreats. IT modernization has...

    Read Article
  • CIO POV: The Power of Cybersecurity Collaboration

    CIO POV: The Power of Cybersecurity Collaboration

    You’ve undoubtedly heard Michael Jordon’s famous quote, “Talent wins games, but teamwork and intelligence win championships.” Jordan’s words encapsulate the fruition of team spirit and strategic...

    Read Article
  • Understanding APIs and How Attackers Abuse Them to Steal Data

    Understanding APIs and How Attackers Abuse Them to Steal Data

    Simply put, APIs (short for application programming interface) are how machines, cloud workloads, automation and other non-human entities communicate with one another. They also represent an...

    Read Article
  • Cookies Beyond Browsers: How Session-Based Attacks Are Evolving

    Cookies Beyond Browsers: How Session-Based Attacks Are Evolving

    In the past few years, we have witnessed a significant shift in the attack landscape, from stealing clear text credentials to targeting session-based authentication. This trend is driven by the...

    Read Article
  • How Secure is Automotive Digital Identity?

    How Secure is Automotive Digital Identity?

    In the automotive industry’s fast lane, the fusion of digital innovation with vehicular engineering has revolutionized how we manufacture, drive and protect our vehicles. It also helps to ensure...

    Read Article
  • loading
    Loading More...