The CyberArk Blog

  • Cloud Identity and Access Management Alphabet Soup: A Definitive Guide

    Cloud Identity and Access Management Alphabet Soup: A Definitive Guide

    Successful digital transformation depends on the security of your cloud environment. Modern organizations recognize the importance of securing identities in the zero-perimeter, Zero Trust world of...

    Read Article
  • It’s Identity Management Day: 16 Stats from the New Cybersecurity Battleground

    It’s Identity Management Day: 16 Stats from the New Cybersecurity Battleground

    Today is Identity Management Day – a U.S. awareness initiative presented by the National Cybersecurity Alliance and the Identity Defined Security Alliance (IDSA). In the midst of a dramatic...

    Read Article
  • Gartner Names CyberArk a Leader in the 2020 Magic Quadrant for PAM

    Download Now
  • 6 Simple Remote Work Security Mistakes and How to Avoid Them

    6 Simple Remote Work Security Mistakes and How to Avoid Them

    Since the COVID-19 outbreak there have been countless headlines and viral social media posts exposing some of the worst remote security faux pas, ranging from the financially devastating to the...

    Read Article
  • Hard-Coded Credentials: The Not-So-Secret Secret Putting Your Cloud at Risk

    Hard-Coded Credentials: The Not-So-Secret Secret Putting Your Cloud at Risk

    If you’ve never celebrated the Epiphany (or Mardi Gras in Louisiana), you have likely missed out on the tradition of the King Cake. It’s a coffee cake-type pastry with a small figurine baked...

    Read Article
  • Applications Are Everything and Everywhere – Does Whack-a-Mole Security Work?

    Applications Are Everything and Everywhere – Does Whack-a-Mole Security Work?

    The SolarWinds digital supply chain attack began by compromising the “heart” of the CI/CD pipeline and successfully changing application code. It highlighted the major challenges organizations...

    Read Article
  • Revelations About Securing Hybrid Cloud Environments Post-SolarWinds

    Revelations About Securing Hybrid Cloud Environments Post-SolarWinds

    In the early 1960s, J.C.R. Licklider, director of the Pentagon’s Information Processing Techniques Office (IPTO), spoke of a future “intergalactic computer network” that would serve as the “main...

    Read Article
  • New CISO View Insights on Zero Trust

    New CISO View Insights on Zero Trust

    Credential theft is on the rise, yet attackers are shifting their collective focus to non-traditional user populations that may not be adequately protected. That’s according to the “The CISO View...

    Read Article
  • CISA and NSA: The Times, They Are A-Changin.’ Identity is Everything Now

    CISA and NSA: The Times, They Are A-Changin.’ Identity is Everything Now

    The recent SolarWinds Senate hearing and a flurry of subsequent briefings have unearthed new questions around the attack, which acting director of the U.S. Cybersecurity and Infrastructure Agency...

    Read Article
  • Different IoT Breach, Same (In)Security Story, Broader Consequences

    Different IoT Breach, Same (In)Security Story, Broader Consequences

    “I always feel like somebody’s watching me… Tell me is it just a dream?” It may have been a dream in 1984 when “Somebody’s Watching Me” topped the charts, but today it’s real life: somebody...

    Read Article
  • Four Trends Shaping the Future of Access Management

    Four Trends Shaping the Future of Access Management

    From a remote employee using a personal device for work, to a marketing consultant logging into a shared social media account, to a customer authenticating to use a SaaS app, someone is accessing...

    Read Article
  • Attacker Productivity: Exploit Misconfigured Identities in the Cloud

    Attacker Productivity: Exploit Misconfigured Identities in the Cloud

    “My goal is no longer to get more done, but rather to have less to do,” writes author Francine Jay. It’s a sentiment that resonates with many of us juggling work, life and everything in...

    Read Article
  • Why the BISO May Be the Utility Player Your Org Needs Now

    Why the BISO May Be the Utility Player Your Org Needs Now

    Back in 2012, Security Innovation wrote about what – at the time – was a relatively new C-Level role dubbed Chief Information Security Officer. In the introductory blog post, the author attempted...

    Read Article
  • Gartner Names CyberArk a Leader in the 2020 Magic Quadrant for PAM

    Download Now
  • SolarWinds Senate Hearing: Moving Forward It’s All About Zero Trust

    SolarWinds Senate Hearing: Moving Forward It’s All About Zero Trust

    We still don’t have a complete picture of what exactly happened during the SolarWinds attack in 2020, nor do we know the full extent yet of the damage or what the long-term impact may be....

    Read Article
  • Why You Need Identity Security

    Why You Need Identity Security

    Learn how an Identity Security approach can secure access across any device, anywhere, at just the right time. No more choosing between security and productivity!

    Read Article
  • Pandemic Cyber Crime, By the Numbers

    Pandemic Cyber Crime, By the Numbers

    Almost a year ago, the world turned upside down and seemingly everything changed due to the COVID-19 pandemic. In that time, entire workforces went – and stayed – home, cloud adoption skyrocketed...

    Read Article
  • The Anatomy of the SolarWinds Attack Chain

    The Anatomy of the SolarWinds Attack Chain

    Imagine there’s an attacker lurking inside your network right now. Do you have the ability to find out and respond before they can cause harm? Now imagine your adversary has privileged access to...

    Read Article
  • Three Best Practices to Get Privileged Remote Access Right for the New Normal Workforce

    Three Best Practices to Get Privileged Remote Access Right for the New Normal Workforce

    While I haven’t seen many of my co-workers in person in almost a year, we’ve found new, collaborative ways to tackle projects – and along the way, we’ve managed to forge even closer connections....

    Read Article
  • Beyond Buy-In: True Change Is Only Achieved Through Accountability

    Beyond Buy-In: True Change Is Only Achieved Through Accountability

    If there is one concept that has dominated the tech world over the past few years, it’s … disruption. It seems the entire industry has been driven by a mission to shake up everything...

    Read Article
  • Get Back to the Basics with Your Company’s Cybersecurity Practices

    Get Back to the Basics with Your Company’s Cybersecurity Practices

    Basic hygiene best practices go beyond hand washing – even if you’re doing lots of that these days. The same hygiene concept extends into the digital world of cybersecurity. In an age of...

    Read Article
  • A Step in the Right Direction: The IoT Cybersecurity Improvement Act

    A Step in the Right Direction: The IoT Cybersecurity Improvement Act

    A constantly growing network of connected devices – also known as the Internet of Things (IoT) – is expanding the landscape and reach of information technology and enabling digital business...

    Read Article
  • loading
    Loading More...