The CyberArk Blog

  • How CISOs Can Use Identity to Advance Zero Trust

    How CISOs Can Use Identity to Advance Zero Trust

    AI is the best thing that’s ever happened to cybercriminals. It allows them to weaponize trust and launch identity-based attacks with staggering scale and sophistication. I’m talking about...

    Read Blog
  • CyberArk Named a Leader in the 2024 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • The Urgent Reality of Machine Identity Security in 2025

    The Urgent Reality of Machine Identity Security in 2025

    The importance of machine identity security has reached a critical juncture in 2025. With machine identities now far outnumbering human ones, securing these digital credentials has become a top...

    Read Blog
  • The Rise of AI Agents—Collaborative Intelligence

    The Rise of AI Agents—Collaborative Intelligence

    2025 marks a pivotal moment. It’s the year AI agents transition from experimental technology to an essential business objective in enterprise operations that can enable growth and scale. These...

    Read Blog
  • Powerful Ally or Potent Threat? How Threat Actors Are Using Artificial Intelligence (AI)

    Powerful Ally or Potent Threat? How Threat Actors Are Using Artificial Intelligence (AI)

    It seems everywhere you look, there’s another update about generative artificial intelligence. No surprise there. And the party’s only just started. After all, the list of possibilities for using...

    Read Blog
  • SSH-Snake Malware: The Self-Modifying, Sssself-Replicating Danger Worming its Way Through Networks

    SSH-Snake Malware: The Self-Modifying, Sssself-Replicating Danger Worming its Way Through Networks

    A new, sophisticated type of open-source malware has slithered its way into the headlines: SSH-Snake. Released on GitHub in January 2024, SSH-Snake is a “powerful tool designed to perform...

    Read Blog
  • Top 10 CISO Post-Quantum Readiness Concerns

    Top 10 CISO Post-Quantum Readiness Concerns

    Every day, it seems quantum computing is making its way out of the halls of science fiction and toward reality, and many CISOs have expressed concerns about a few specific areas of post-quantum...

    Read Blog
  • OWASP Top 10 for LLMs Reveals Critical Need for Machine Authentication

    OWASP Top 10 for LLMs Reveals Critical Need for Machine Authentication

    In 2024, OWASP released their Top 10 for Large Language Model (LLM) Applications, a list that aims to educate on the potential security risks involved with deploying and managing LLMs. The release...

    Read Blog
  • Herding Certs: How to Automate to Effectively Manage and Secure Machine Identities

    Herding Certs: How to Automate to Effectively Manage and Secure Machine Identities

    The number of machine identities we use is growing astronomically. Some statistics state that we’re dealing with 45x more machine identities than human identities. Also that large organizations...

    Read Blog
  • Exploring the Fusion of AI and Quantum Computing

    Exploring the Fusion of AI and Quantum Computing

    Several of us here at CyberArk have written and spoken at length about the subjects of artificial intelligence and quantum computing, including both the benefits and risks they pose to society....

    Read Blog
  • The Emerging AI Threatscape: 5 New Risks to AI Models

    The Emerging AI Threatscape: 5 New Risks to AI Models

    We are at a convergence with machines, both in terms of machine learning and how that impacts trust issues surrounding machine identities. It’s been building for a while, but AI represents the...

    Read Blog
  • PQC Crisis Averted: LWE- and Lattice-Based Algorithms Not (Quite) Vulnerable

    PQC Crisis Averted: LWE- and Lattice-Based Algorithms Not (Quite) Vulnerable

    On April 10, 2024, a Shanghai researcher, Yilei Chen, purportedly solved the hard problem underlying quantum algorithms using a Learning With Errors (LWE) approach. We’ll go into detail about what...

    Read Blog
  • Workforce Passwordless Authentication: Beyond the Hype and Here to Stay

    Workforce Passwordless Authentication: Beyond the Hype and Here to Stay

    Let’s face it—passwords are a pain, especially for employees and contractors who deal with them daily. We all know that our so-called “secure” passwords often end up being something like...

    Read Blog
  • The Agentic AI Revolution: 5 Unexpected Security Challenges

    The Agentic AI Revolution: 5 Unexpected Security Challenges

    As we stand on the brink of the agentic AI revolution, it’s crucial to understand the profound impact AI agents will have on how people, applications and devices interact with systems and data....

    Read Blog
  • What’s On the Horizon for AI Risk Management

    What’s On the Horizon for AI Risk Management

    Sam Altman’s recently published “Reflections” blog is one of those pieces that made me stop mid-scroll and wonder, “We’re really right in it, aren’t we?” Part think piece, part reality check, it’s...

    Read Blog
  • CIO POV: Five Essential Themes Shaping the CIO’s Tech Agenda

    CIO POV: Five Essential Themes Shaping the CIO’s Tech Agenda

    Technology is rapidly redefining how we live and work. As CIO at CyberArk, I often get asked about the themes and realities shaping today’s tech agenda. Some of them—I’m looking at you, AI—are...

    Read Blog
  • Deepfake Reality: My Experience as a Target

    Deepfake Reality: My Experience as a Target

    Cybersecurity has been my world for years. I’ve worked hard to build my reputation, moving from the hacker underground to a trusted boardroom expert. I take my role seriously because trust and...

    Read Blog
  • Reshaping IGA for the Modern Enterprise: Welcome Zilla Security to CyberArk

    Reshaping IGA for the Modern Enterprise: Welcome Zilla Security to CyberArk

    This week, we announced an important development in our journey to deliver the industry’s most powerful, comprehensive identity security platform. CyberArk has acquired Zilla Security, a leader in...

    Read Blog
  • Web-Based AI Agents: Unveiling the Emerging Insider Threat

    Web-Based AI Agents: Unveiling the Emerging Insider Threat

    The Rapid Rise of Web-Based AI Agents The introduction of OpenAI’s ‘Operator’ is a game changer for AI-driven automation. Currently designed for consumers, it’s only a matter of time before such...

    Read Blog
  • Announcing CyberArk Application Access Manager — Secrets Management for Applications, Tools, Containers and DevOps

    Announcing CyberArk Application Access Manager — Secrets Management for Applications, Tools, Containers and DevOps

    Learn how CyberArk Application Access Manager can help you control, manage and audit non-human privileged access for a wide range of applications across on-premises, hybrid and cloud environments.

    Read Blog
  • Boost Cloud Security Without Bugging Your Developers

    Boost Cloud Security Without Bugging Your Developers

    Developers are incredibly valuable to an organization’s progress and evolution. They must innovate quickly while simultaneously navigating changes to their day-to-day operations as companies...

    Read Blog
  • loading
    Loading More...