The CyberArk Blog
-
Read ArticleEnterprise Browser: The Gateway to Securing All Identities
With new identities, environments and attack methods dominating today’s threat landscape, cybersecurity leaders are hyper-focused on securing identities to safeguard enterprises. However, a...
-
CyberArk Named a Leader in the 2023 Gartner® Magic Quadrant™ for Privileged Access Management – again.
View the Report -
Read ArticleCIO POV: 3 Considerations as the 2024 Cyber Roller Coaster Gathers Speed
If the first month-plus of 2024 is any indication, this year is likely to be anything but ordinary in the cybersecurity realm. In January alone, a triad of events unfolded, each more riveting than...
-
Read ArticleAPT29’s Attack on Microsoft: Tracking Cozy Bear’s Footprints
A new and concerning chapter has unfolded in these troubled times of geopolitical chaos. The Cozy Bear threat actor has caused significant breaches targeting Microsoft and HPE, and more are likely...
-
Read ArticleRedefining PAM to Secure OT and IoT Devices
Left to their own devices, your organization’s devices can be a significant source of risk. Consider operational technology (OT), which is crucial for organizations but is not engineered and...
-
Read ArticleElevating Cloud Security With Well-Architected Practices
It’s said that life truly begins when you step out of your comfort zone. Living in California provides me with many options for hiking and trekking, a perfect backdrop for spending time with...
-
Read ArticleGenAI’s Role in Upskilling to Close the Cybersecurity Skills Gap
The cybersecurity industry has a major people problem: it doesn’t have enough of them. The global shortage of more than 4 million cybersecurity workers isn’t a new phenomenon, but as digital and...
-
Read ArticleWhy Identity Security Requires More Than ITDR
Identity Threat Detection and Response (ITDR) is one of many aspects of an effective identity security program. Yet despite what some detection and response-focused vendors may argue, ITDR is not...
-
Read Article3 Things About 2023’s Threat Landscape That Shapes My 2024 CIO POV
2023 was a tumultuous year that drove technology transformations at a pace unknown. The industry saw an accelerated and unrivaled pace of technology adoption, persistent yet evolving challenges...
-
Read ArticleSecuring High-Risk Access with Reimagined PAM Controls: A Customer Story
My team and I were on a call with a customer who saw a critical need to secure access to his company’s cloud service provider (CSP) containers. Our conversation comes to mind often, because it...
-
Read ArticleCyberArk Labs’ 2023 Threat Research Highlights
Throughout an eventful 2023, CyberArk Labs remained focused on uncovering emerging cyberattack patterns and producing threat research aimed at helping organizations strengthen their identity...
-
Read ArticleSecure Identities With These Five Intelligent Privilege Controls
If you’re reading this, a major part of your job is making the case for security-related issues you know are urgent. You may be among the 97% of CISOs being asked to present to their...
-
Read ArticleWhy Intelligent Privilege Controls Are Essential for Identity Security
“If we can control identity, we can stop most modern attacks. And if you control identity, then you control every perimeter, application, container – effectively every part of the environment.” –...
-
Read ArticleExploring the Risks of Read-Only Access in the Cloud
My career began with read-only access. In my first job, I worked night shifts in a data operations center. Our team handled incidents identified either by monitoring or from end customers. This...
-
Read ArticleHow to Meet Cyber Insurance Requirements When All Identities Are at Risk
The growing frequency and sophistication of cyberattacks, especially on the ransomware front, have compelled even more companies to seek cyber insurance coverage. But as the need for coverage...
-
Read ArticleWhy Ransomware Actors Abuse Legitimate Software
2023 was a lucrative year for ransomware actors, with victim organizations paying $449.1 million in the first six months alone. Maintaining this cash stream requires frequent technique shifts,...
-
Read ArticleCybersecurity Predictions for 2024 and Beyond
Many of us took ChatGPT for a first-time spin just 12 months ago. Then someone hit the speed multiplier button, and just like that, we’re exiting 2023 with whiplash. Generative artificial...
-
Read ArticleReduce Compliance Complexities by Securing All Identities
When complying with regulations and frameworks, it’s hard to keep up when the rules keep evolving. Auditors are no longer just seeking reports on what your identities can access – they now require...
-
Read ArticleHow Telecom Providers Can Bolster Identity Security to Meet the UK TSA
As technology evolves, so do the threats that loom over our communication infrastructure. The rollout of 5G, the rise of artificial intelligence (AI) and our ongoing dependence on these networks...
-
Read ArticleIdentity Security’s Crucial Role in Safeguarding Data Privacy
More than 130 global jurisdictions have enacted data privacy laws. While each contains rules and requirements distinct to their regions, they share a common priority: identity security. That’s...
-
Read ArticleBuilding Secure and Compliant SaaS Apps – Identity Security Best Practices
Do you need to secure high-risk access to the back end of your customer-facing apps? Yes, you do – assuming you care about cybersecurity risk, uptime or compliance with SOC II and NIST and AWS,...
-
Loading More...


