The CyberArk Blog

  • Why Ransomware Actors Abuse Legitimate Software

    Why Ransomware Actors Abuse Legitimate Software

    2023 was a lucrative year for ransomware actors, with victim organizations paying $449.1 million in the first six months alone. Maintaining this cash stream requires frequent technique shifts,...

    Read Article
  • CyberArk Named a Leader in the 2023 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • Cybersecurity Predictions for 2024 and Beyond

    Cybersecurity Predictions for 2024 and Beyond

    Many of us took ChatGPT for a first-time spin just 12 months ago. Then someone hit the speed multiplier button, and just like that, we’re exiting 2023 with whiplash. Generative artificial...

    Read Article
  • Reduce Compliance Complexities by Securing All Identities

    Reduce Compliance Complexities by Securing All Identities

    When complying with regulations and frameworks, it’s hard to keep up when the rules keep evolving. Auditors are no longer just seeking reports on what your identities can access – they now require...

    Read Article
  • How Telecom Providers Can Bolster Identity Security to Meet the UK TSA

    How Telecom Providers Can Bolster Identity Security to Meet the UK TSA

    As technology evolves, so do the threats that loom over our communication infrastructure. The rollout of 5G, the rise of artificial intelligence (AI) and our ongoing dependence on these networks...

    Read Article
  • Identity Security’s Crucial Role in Safeguarding Data Privacy

    Identity Security’s Crucial Role in Safeguarding Data Privacy

    More than 130 global jurisdictions have enacted data privacy laws. While each contains rules and requirements distinct to their regions, they share a common priority: identity security. That’s...

    Read Article
  • Building Secure and Compliant SaaS Apps – Identity Security Best Practices

    Building Secure and Compliant SaaS Apps – Identity Security Best Practices

    Do you need to secure high-risk access to the back end of your customer-facing apps? Yes, you do – assuming you care about cybersecurity risk, uptime or compliance with SOC II and NIST and AWS,...

    Read Article
  • Why ITDR Matters for Your Enterprise’s Identity Security

    Why ITDR Matters for Your Enterprise’s Identity Security

    You may not recognize the term Identity Threat Detection and Response (ITDR), but this emerging security discipline aims to address an all-too-familiar challenge: managing and securing the massive...

    Read Article
  • Skeleton Keys and Local Admin Passwords: A Cautionary Tale

    Skeleton Keys and Local Admin Passwords: A Cautionary Tale

    Picture yourself immersed in your favorite mystery novel, eagerly flipping through the pages as the suspense thickens. You’re enthralled, engrossed in the story of a hotel burglar with an uncanny...

    Read Article
  • Piecing Together the Attack on Okta’s Support Unit

    Piecing Together the Attack on Okta’s Support Unit

    The October 2023 Okta breach is the latest example in a long line of third-party identity attacks. Based on reports to date, it seems that the attack on Okta’s support case management system...

    Read Article
  • Considering Passwordless? Here’s How to Do It

    Considering Passwordless? Here’s How to Do It

    When creating a new password, you know the drill – it must be at least eight characters long, contain special characters and avoid sequential characters or be based on dictionary words. Although...

    Read Article
  • Our Hearts Are Broken, But We Will Prevail

    Our Hearts Are Broken, But We Will Prevail

    We are horrified by the barbaric attack on Israel and the Israeli people. Those of us who are watching from a distance are standing in solidarity with our friends, loved ones and colleagues who are...

    Read Article
  • PAM and Cloud Security: The Case for Zero Standing Privileges

    PAM and Cloud Security: The Case for Zero Standing Privileges

    The cloud has introduced entirely new environments, roles and circumstances that require us to reimagine the definition of privileged access management (PAM) and how to apply those principles to...

    Read Article
  • 6 Essential Steps for Identity Security in Multi-Cloud Environments

    6 Essential Steps for Identity Security in Multi-Cloud Environments

    In 2019, I founded and served as the CEO of a cloud security company (C3M), a journey that eventually led to our acquisition by CyberArk in 2022. Back then, the cloud security scene was budding,...

    Read Article
  • Engaging Insiders to Combat Insider Threats

    Engaging Insiders to Combat Insider Threats

    Every IT and security leader loses sleep over insider threats. They’re notoriously difficult to detect, costly to mitigate and can lead to widespread loss and reputational damage. Despite efforts...

    Read Article
  • The MGM Resorts Attack: Initial Analysis

    The MGM Resorts Attack: Initial Analysis

    The recent cyberattack on MGM Resorts International has raised serious concerns about the security of sensitive data and the vulnerabilities organizations face in today’s digital landscape. In...

    Read Article
  • Securing Workforce Access with Greater Visibility, Integration and Automation

    Securing Workforce Access with Greater Visibility, Integration and Automation

    Over six in 10 security decision-makers say their teams operate with limited visibility across their environments. Why? We could easily speculate that it comes down to the tools they do or don’t...

    Read Article
  • Cloud Identity Security Success: 3 Critical Factors

    Cloud Identity Security Success: 3 Critical Factors

    Today, more than ever, security is all about identity. Especially in the cloud, the central management and proliferation of cloud services means that with the proper identity and permissions, one...

    Read Article
  • Is Open Source Software Dead?

    Is Open Source Software Dead?

    How Cloud and SaaS are Actively Disrupting Open Source Open source software (OSS) has driven technological growth for decades due to its collaborative nature and ability to share information...

    Read Article
  • CyberArk Named a Leader in the Gartner® Magic Quadrant™ for PAM for the Fifth Time

    CyberArk Named a Leader in the Gartner® Magic Quadrant™ for PAM for the Fifth Time

    Today, I’m honored to share that CyberArk has been named a Leader in the “2023 Gartner® Magic Quadrant™ for Privileged Access Management.”1 This is the fifth time our company has been positioned...

    Read Article
  • Securing Endpoints By Applying ‘Passive Income’ Concepts

    Securing Endpoints By Applying ‘Passive Income’ Concepts

    Investing in cybersecurity is a lot like working hard to save for retirement. Your budget’s already tight, but you must secure the future. You’re faced with endless headlines and market updates...

    Read Article
  • loading
    Loading More...