The CyberArk Blog

  • Who’s Responsible for Your Security?

    Who’s Responsible for Your Security?

    Antivirus, malware protection, email security, EDR, XDR, next-generation firewalls, AI-enabled analytics – the list of protective controls and vendors appears to go on forever. Each day, bad...

    Read Blog
  • CyberArk Named a Leader in the 2024 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • Six Key Measures for Upholding Election Security and Integrity

    Six Key Measures for Upholding Election Security and Integrity

    Decision 2024 – the ultimate election year – is in full swing, with more than 60 countries holding national elections this cycle. In the United States, where presidential candidates are polling...

    Read Blog
  • A New Era of Machine Identity Security: Welcome Venafi to CyberArk

    A New Era of Machine Identity Security: Welcome Venafi to CyberArk

    We are thrilled to announce that we have completed the acquisition of Venafi, a recognized leader in machine identity management. This strategic move aligns with our commitment to not just...

    Read Blog
  • Critical Access Controls: Ensuring Database Security

    Critical Access Controls: Ensuring Database Security

    Securing database access has become a critical concern for organizations globally. Your organization’s data is its most valuable asset, encompassing everything about your business, partners,...

    Read Blog
  • Zero Standing Privileges (ZSP): Vendor Myths vs. Reality

    Zero Standing Privileges (ZSP): Vendor Myths vs. Reality

    Several new vendors entering the privileged access management (PAM) market are boldly claiming they can – or will soon be able to – provide access with zero standing privileges (ZSP). In reality,...

    Read Blog
  • DORA Compliance: A Security Wake-Up Call

    DORA Compliance: A Security Wake-Up Call

    The Clock is Ticking The Digital Operational Resilience Act (DORA) is about to shake things up in the EU, and if you’re not ready, it’s time to get moving. With the new regulations set to...

    Read Blog
  • CIO POV: Impactful AI Programs Start with ‘Why’

    CIO POV: Impactful AI Programs Start with ‘Why’

    Generative AI (GenAI) has the power to transform organizations from the inside out. Yet many organizations are struggling to prove the value of their GenAI investments after the initial push to...

    Read Blog
  • LLMs Gone Wild: AI Without Guardrails

    LLMs Gone Wild: AI Without Guardrails

    From the moment ChatGPT was released to the public, offensive actors started looking to use this new wealth of knowledge to further nefarious activities. Many of the controls we have become...

    Read Blog
  • CyberArk Recognized as a Leader in 2024 Gartner® Magic Quadrant™ for PAM

    CyberArk Recognized as a Leader in 2024 Gartner® Magic Quadrant™ for PAM

    Today, we’re exceptionally proud to announce our recognition as a Leader in the “2024 Gartner® Magic Quadrant™ for Privileged Access Management (PAM)”1 for the sixth time in a row. CyberArk was...

    Read Blog
  • How Overreliance on EDR is Failing Healthcare Providers

    How Overreliance on EDR is Failing Healthcare Providers

    Ransomware attacks have a profound impact on healthcare organizations, extending well beyond financial losses and the disrupted sleep of staff and shareholders. A University of Minnesota School of...

    Read Blog
  • Applying a ‘Three-Box Solution’ to Identity Security Strategies

    Applying a ‘Three-Box Solution’ to Identity Security Strategies

    Physical and network barriers that once separated corporate environments from the outside world no longer exist. In this new technological age defined by hybrid, multi-cloud and SaaS, identities...

    Read Blog
  • The Rise of the Machines and the Growing AI Identity Attack Surface

    The Rise of the Machines and the Growing AI Identity Attack Surface

    In 1968, a killer supercomputer named HAL 9000 gripped imaginations in the sci-fi thriller “2001: A Space Odyssey.” The dark side of artificial intelligence (AI) was intriguing, entertaining and...

    Read Blog
  • The Human Factor in a Tech-Driven World: Insights from the CrowdStrike Outage

    The Human Factor in a Tech-Driven World: Insights from the CrowdStrike Outage

    AI and Deep Fake Technology v. The Human Element The idea that people are the weakest link has been a constant topic of discussion in cybersecurity conversations for years, and this may have been...

    Read Blog
  • Zero Standing Privileges: The Essentials

    Zero Standing Privileges: The Essentials

    In December, I’ll have been with CyberArk for seven years, and at a similar point, I’ll have spent two years leading product marketing for cloud security at the company. In my short tenure with...

    Read Blog
  • CIO POV: CrowdStrike Incident Offers 3 Digital Resilience Lessons

    CIO POV: CrowdStrike Incident Offers 3 Digital Resilience Lessons

    On July 19, 2024, organizations around the world began to experience the “blue screen of death” in what would soon be considered one of the largest IT outages in history. Early rumors of a mass...

    Read Blog
  • Navigating Cloud Security: A Shared Responsibility

    Navigating Cloud Security: A Shared Responsibility

    Each July, my family and I take a road trip from Kentucky back to my hometown in northwestern Pennsylvania to spend time on Lake Erie. As tradition dictates, we stop along I-71 for coffee at...

    Read Blog
  • 5 Strategies for Setting the Right Cybersecurity KPIs

    5 Strategies for Setting the Right Cybersecurity KPIs

    Cybersecurity key performance indicators (KPIs) measure the efficacy of an organization’s cybersecurity program. In a rapidly changing threat landscape characterized by new identities,...

    Read Blog
  • Mission Possible: Securing Developer Access, CI/CD and Code (With Love)

    Mission Possible: Securing Developer Access, CI/CD and Code (With Love)

    Okay, so you’re a security leader at your enterprise – congratulations! It’s a big, challenging role, as you know too well. You or a colleague are likely responsible for securing the cloud and...

    Read Blog
  • CIO POV: Rethinking Data Security Post-Snowflake Customer Attacks

    CIO POV: Rethinking Data Security Post-Snowflake Customer Attacks

    Watching the recent Snowflake customer attacks unfold felt a bit like rewatching a horror movie with predictable attack sequences and missed opportunities to run to safety. But this time, the...

    Read Blog
  • What ‘Passwordless’ Really Means for Privileged Access Management

    What ‘Passwordless’ Really Means for Privileged Access Management

    Privileged access management (PAM) programs aim to secure the highest-risk access in an organization, including using privileged credentials like passwords, SSH keys and application secrets. So,...

    Read Blog
  • loading
    Loading More...