The CyberArk Blog
-
6 Simple Remote Work Security Mistakes and How to Avoid Them
Since the COVID-19 outbreak there have been countless headlines and viral social media posts exposing some of the worst remote security faux pas, ranging from the financially devastating to the...
-
Hard-Coded Credentials: The Not-So-Secret Secret Putting Your Cloud at Risk
If you’ve never celebrated the Epiphany (or Mardi Gras in Louisiana), you have likely missed out on the tradition of the King Cake. It’s a coffee cake-type pastry with a small figurine baked...
-
Gartner Names CyberArk a Leader in the 2020 Magic Quadrant for PAM
Download Now -
Applications Are Everything and Everywhere – Does Whack-a-Mole Security Work?
The SolarWinds digital supply chain attack began by compromising the “heart” of the CI/CD pipeline and successfully changing application code. It highlighted the major challenges organizations...
-
Revelations About Securing Hybrid Cloud Environments Post-SolarWinds
In the early 1960s, J.C.R. Licklider, director of the Pentagon’s Information Processing Techniques Office (IPTO), spoke of a future “intergalactic computer network” that would serve as the “main...
-
New CISO View Insights on Zero Trust
Credential theft is on the rise, yet attackers are shifting their collective focus to non-traditional user populations that may not be adequately protected. That’s according to the “The CISO View...
-
CISA and NSA: The Times, They Are A-Changin.’ Identity is Everything Now
The recent SolarWinds Senate hearing and a flurry of subsequent briefings have unearthed new questions around the attack, which acting director of the U.S. Cybersecurity and Infrastructure Agency...
-
Different IoT Breach, Same (In)Security Story, Broader Consequences
“I always feel like somebody’s watching me… Tell me is it just a dream?” It may have been a dream in 1984 when “Somebody’s Watching Me” topped the charts, but today it’s real life: somebody...
-
Four Trends Shaping the Future of Access Management
From a remote employee using a personal device for work, to a marketing consultant logging into a shared social media account, to a customer authenticating to use a SaaS app, someone is accessing...
-
Attacker Productivity: Exploit Misconfigured Identities in the Cloud
“My goal is no longer to get more done, but rather to have less to do,” writes author Francine Jay. It’s a sentiment that resonates with many of us juggling work, life and everything in...
-
Why the BISO May Be the Utility Player Your Org Needs Now
Back in 2012, Security Innovation wrote about what – at the time – was a relatively new C-Level role dubbed Chief Information Security Officer. In the introductory blog post, the author attempted...
-
SolarWinds Senate Hearing: Moving Forward It’s All About Zero Trust
We still don’t have a complete picture of what exactly happened during the SolarWinds attack in 2020, nor do we know the full extent yet of the damage or what the long-term impact may be....
-
Why You Need Identity Security
Learn how an Identity Security approach can secure access across any device, anywhere, at just the right time. No more choosing between security and productivity!
-
Gartner Names CyberArk a Leader in the 2020 Magic Quadrant for PAM
Download Now -
Pandemic Cyber Crime, By the Numbers
Almost a year ago, the world turned upside down and seemingly everything changed due to the COVID-19 pandemic. In that time, entire workforces went – and stayed – home, cloud adoption skyrocketed...
-
The Anatomy of the SolarWinds Attack Chain
Imagine there’s an attacker lurking inside your network right now. Do you have the ability to find out and respond before they can cause harm? Now imagine your adversary has privileged access to...
-
Three Best Practices to Get Privileged Remote Access Right for the New Normal Workforce
While I haven’t seen many of my co-workers in person in almost a year, we’ve found new, collaborative ways to tackle projects – and along the way, we’ve managed to forge even closer connections....
-
Beyond Buy-In: True Change Is Only Achieved Through Accountability
If there is one concept that has dominated the tech world over the past few years, it’s … disruption. It seems the entire industry has been driven by a mission to shake up everything...
-
Get Back to the Basics with Your Company’s Cybersecurity Practices
Basic hygiene best practices go beyond hand washing – even if you’re doing lots of that these days. The same hygiene concept extends into the digital world of cybersecurity. In an age of...
-
A Step in the Right Direction: The IoT Cybersecurity Improvement Act
A constantly growing network of connected devices – also known as the Internet of Things (IoT) – is expanding the landscape and reach of information technology and enabling digital business...
-
5 Ways to Secure Your Windows Servers and Detect Advanced Threats Faster
As details of the recent SolarWinds supply chain attack continue to surface, we’re beginning to understand just how far these motivated attackers went to avoid attention and detection. What’s...
-
Banking Cybersecurity Vet: Why Transformation Must Start at the Top
The banking industry spends 40% more on combating cybercrime than any other industry, with a per-firm average of $18.5 million spent on direct costs of incidents annually. When you also consider...
-
Loading More...