The CyberArk Blog

  • The Urgent Reality of Machine Identity Security in 2025

    The Urgent Reality of Machine Identity Security in 2025

    The importance of machine identity security has reached a critical juncture in 2025. With machine identities now far outnumbering human ones, securing these digital credentials has become a top...

    Read Blog
  • CyberArk Named a Leader in the 2024 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • The Rise of AI Agents—Collaborative Intelligence

    The Rise of AI Agents—Collaborative Intelligence

    2025 marks a pivotal moment. It’s the year AI agents transition from experimental technology to an essential business objective in enterprise operations that can enable growth and scale. These...

    Read Blog
  • Workforce Passwordless Authentication: Beyond the Hype and Here to Stay

    Workforce Passwordless Authentication: Beyond the Hype and Here to Stay

    Let’s face it—passwords are a pain, especially for employees and contractors who deal with them daily. We all know that our so-called “secure” passwords often end up being something like...

    Read Blog
  • The Agentic AI Revolution: 5 Unexpected Security Challenges

    The Agentic AI Revolution: 5 Unexpected Security Challenges

    As we stand on the brink of the agentic AI revolution, it’s crucial to understand the profound impact AI agents will have on how people, applications and devices interact with systems and data....

    Read Blog
  • What’s On the Horizon for AI Risk Management

    What’s On the Horizon for AI Risk Management

    Sam Altman’s recently published “Reflections” blog is one of those pieces that made me stop mid-scroll and wonder, “We’re really right in it, aren’t we?” Part think piece, part reality check, it’s...

    Read Blog
  • CIO POV: Five Essential Themes Shaping the CIO’s Tech Agenda

    CIO POV: Five Essential Themes Shaping the CIO’s Tech Agenda

    Technology is rapidly redefining how we live and work. As CIO at CyberArk, I often get asked about the themes and realities shaping today’s tech agenda. Some of them—I’m looking at you, AI—are...

    Read Blog
  • Deepfake Reality: My Experience as a Target

    Deepfake Reality: My Experience as a Target

    Cybersecurity has been my world for years. I’ve worked hard to build my reputation, moving from the hacker underground to a trusted boardroom expert. I take my role seriously because trust and...

    Read Blog
  • Reshaping IGA for the Modern Enterprise: Welcome Zilla Security to CyberArk

    Reshaping IGA for the Modern Enterprise: Welcome Zilla Security to CyberArk

    This week, we announced an important development in our journey to deliver the industry’s most powerful, comprehensive identity security platform. CyberArk has acquired Zilla Security, a leader in...

    Read Blog
  • Web-Based AI Agents: Unveiling the Emerging Insider Threat

    Web-Based AI Agents: Unveiling the Emerging Insider Threat

    The Rapid Rise of Web-Based AI Agents The introduction of OpenAI’s ‘Operator’ is a game changer for AI-driven automation. Currently designed for consumers, it’s only a matter of time before such...

    Read Blog
  • Announcing CyberArk Application Access Manager — Secrets Management for Applications, Tools, Containers and DevOps

    Announcing CyberArk Application Access Manager — Secrets Management for Applications, Tools, Containers and DevOps

    Learn how CyberArk Application Access Manager can help you control, manage and audit non-human privileged access for a wide range of applications across on-premises, hybrid and cloud environments.

    Read Blog
  • Boost Cloud Security Without Bugging Your Developers

    Boost Cloud Security Without Bugging Your Developers

    Developers are incredibly valuable to an organization’s progress and evolution. They must innovate quickly while simultaneously navigating changes to their day-to-day operations as companies...

    Read Blog
  • DeepSeek DDoS: Why AI Needs Machine Identity Security

    DeepSeek DDoS: Why AI Needs Machine Identity Security

    Imagine a sleek, high-tech sports car racing downhill without brakes. Now, imagine that car is actually the AI driving your business. Powerful yet precariously close to catastrophe. That’s why, as...

    Read Blog
  • The Evolution of Fraud: How Deepfake Technology is Changing Cybercrime

    The Evolution of Fraud: How Deepfake Technology is Changing Cybercrime

    As a former black hat hacker, social engineering and phishing concepts are not new to me. I have used these techniques in my previous life, so I know their effectiveness. Having spent years...

    Read Blog
  • Modernize Your Directory Without Compromising Linux Security

    Modernize Your Directory Without Compromising Linux Security

    In today’s threat landscape, you’re at risk if you don’t have all your identities—human and machine—secured with the right level of intelligent privilege controls. And the risk is even more...

    Read Blog
  • Machine Identities Elevated: Insights from the White House Executive Order

    Machine Identities Elevated: Insights from the White House Executive Order

    Impact of the Executive Order on Software Supply Chain Security, AI and Machine Identities Cybersecurity is no longer just a niche issue tucked away in back-office conversations. It’s a...

    Read Blog
  • The US Treasury Attack: Key Events and Security Implications

    The US Treasury Attack: Key Events and Security Implications

    There’s a dark joke in cybersecurity: each year ends with an unwelcome holiday surprise—a major security incident. This timing isn’t random. Threat actors target this timing, knowing security...

    Read Blog
  • Securing the Backbone of Enterprise GenAI

    Securing the Backbone of Enterprise GenAI

    The rise of generative AI (GenAI) over the past two years has driven a whirlwind of innovation and a massive surge in demand from enterprises worldwide to utilize this transformative technology....

    Read Blog
  • Prepare for 2025 Cyberthreats with Research Insights from CyberArk Labs

    Prepare for 2025 Cyberthreats with Research Insights from CyberArk Labs

    The year 2025 started with a bang, with these cybersecurity stories making headlines in the first few days: New details emerged on a “major” identity-related security incident involving the U.S....

    Read Blog
  • How to Prepare for 90-Day TLS Certificate Lifespans with Automation

    How to Prepare for 90-Day TLS Certificate Lifespans with Automation

    The discussion about managing the impact of shorter TLS certificate lifespans began with the proposal from Google to shorten the lifespan of public-facing certificates to 90 days. And then the...

    Read Blog
  • 7 Key Factors to Consider When Choosing a Modern PAM Solution in 2025

    7 Key Factors to Consider When Choosing a Modern PAM Solution in 2025

    In 2025, global cybersecurity trends like the rise of Zero Trust, tightening data privacy and AI regulations and growing concerns over cloud security will only accelerate. Each of these evolving...

    Read Blog
  • loading
    Loading More...