The CyberArk Blog

  • RPA and the Speed vs. Security Balancing Act

    RPA and the Speed vs. Security Balancing Act

    Robotic process automation, or RPA for short, is one of those hefty technical terms that can be tough to explain without a lot of jargon. But at the highest level, RPA is all about using...

    Read Article
  • 6 Best Practices for Securing Employee Workstations Everywhere

    6 Best Practices for Securing Employee Workstations Everywhere

    The future of work is “less about a place and more about people’s potential,” notes a recent Accenture study, which found that 63% of high-growth companies have already adopted “productivity...

    Read Article
  • Gartner Names CyberArk a Leader in the 2021 Magic Quadrant for PAM

    Download Now
  • CyberArk Ventures: Bringing Security-First Innovators Together to Amplify Impact

    CyberArk Ventures: Bringing Security-First Innovators Together to Amplify Impact

    Security is our north star at CyberArk. It guides every step we take as a company, from pioneering the Privileged Access Management space to delivering on our Identity Security vision today. Our...

    Read Article
  • 4 Extraordinary Women in Identity Security Named to CRN’s 2022 Women of the Channel List

    4 Extraordinary Women in Identity Security Named to CRN’s 2022 Women of the Channel List

    Each year, CRN’s Women of the Channel list honors the accomplishments of female leaders in the IT channel. Today, we celebrate four of CyberArk’s own incredible Women in Identity Security named to...

    Read Article
  • CISOs Are Having a Moment. Here’s How to Make It Last

    CISOs Are Having a Moment. Here’s How to Make It Last

    The landmark Sarbanes-Oxley Act of 2002 (SOX) was passed during a highly tumultuous era, overhauling corporate governance and bringing financial expertise to the boardroom. Fast-forward to present...

    Read Article
  • You’ve Got Privileged Access Management… But Can You Keep Secrets Secure?

    You’ve Got Privileged Access Management… But Can You Keep Secrets Secure?

    Threat actors don’t often need to execute the latest zero-day exploit or fight through firewalls to launch their attacks. Instead, they simply walk through the front door with stolen user...

    Read Article
  • CyberArk SaaS Solutions Now In-Process for FedRAMP High Authorization

    CyberArk SaaS Solutions Now In-Process for FedRAMP High Authorization

    The Biden Administration’s Executive Order (EO) on “Improving the Nation’s Cybersecurity (14028)” and memorandum on “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles (OMB...

    Read Article
  • Secrets Management to Protect the Software Supply Chain: A Q&A with IDC’s Jim Mercer

    Secrets Management to Protect the Software Supply Chain: A Q&A with IDC’s Jim Mercer

    Governments and intelligence agencies continue to emphasize technology providers’ critical role in strengthening cybersecurity and supply chain resilience for the long run. In fact, the Biden...

    Read Article
  • 4 Ways to Strengthen Your Identity Provider with Defense in Depth

    4 Ways to Strengthen Your Identity Provider with Defense in Depth

    Some of the world’s most technologically advanced enterprises have grappled with identity-related breaches in recent months. These incidents have further highlighted how digital identities have...

    Read Article
  • Kids Talk Cybersecurity, Online Habits and Growing Up in the Digital World

    Kids Talk Cybersecurity, Online Habits and Growing Up in the Digital World

    Those of us who “came of age with the internet” had the luxury of testing the digital waters slowly — waiting for the dial-up modem to screech to life once or twice a week and...

    Read Article
  • How Digital Identities Drive Cybersecurity Debt, the Hidden Transformation Trade-Off

    How Digital Identities Drive Cybersecurity Debt, the Hidden Transformation Trade-Off

    Many cybersecurity concepts are complex and often difficult to explain to non-technical audiences. Kerberoasting? Golden SAML? Huh? This can make it challenging for security leaders to communicate...

    Read Article
  • 4 Reasons to “Enroll” at CyberArk University

    4 Reasons to “Enroll” at CyberArk University

    CyberArk University is the best place to learn the ins and outs of the CyberArk Identity Security Platform — whether you’re an administrator looking to learn the fundamentals of CyberArk...

    Read Article
  • Why SOC 2 Compliance Is a Matter of (Zero) Trust

    Why SOC 2 Compliance Is a Matter of (Zero) Trust

    SaaS solutions are now so entwined in business users’ daily routines that they seem to meld into one experience — or simply put, “the way I work.” Yet the reality is there are many disparate...

    Read Article
  • Identity Security Tips to Protect Your Turf

    Identity Security Tips to Protect Your Turf

    You spent the entire afternoon manicuring your front lawn. But within an hour three kids, your neighbor and the DoorDash guy all trampled over it to get to your door. That’s despite the KEEP OFF...

    Read Article
  • Women in Identity Security Spotlight: Erica Smith, CyberArk SVP of IR and ESG

    Women in Identity Security Spotlight: Erica Smith, CyberArk SVP of IR and ESG

    March is Women’s History Month, a celebration of women’s past and present contributions to society, business and culture, and a fitting time to recognize one of CyberArk’s own intrepid Women in...

    Read Article
  • CyberArk’s Perspective on the January 2022 Okta Compromise

    CyberArk’s Perspective on the January 2022 Okta Compromise

    Okta, a major Identity and Access Management vendor, has confirmed it was compromised in a targeted cyber attack in January 2022 by way of a third-party support engineer’s machine. This...

    Read Article
  • Ransomware Rewind: From Floppy Disks to Ransomcloud Attacks

    Ransomware Rewind: From Floppy Disks to Ransomcloud Attacks

    From plug-and-play ransomware-as-a-service offerings to highly skilled operator-based attacks, ransomware is proof that cyber attackers are constantly innovating to achieve their goals. Long...

    Read Article
  • Endpoint Credential Theft: How to Block and Tackle at Scale

    Endpoint Credential Theft: How to Block and Tackle at Scale

    Tracking and fixing bugs across digital enterprise environments has always been tricky — and it’s getting even harder. Threat researchers logged a record-breaking number of common vulnerabilities...

    Read Article
  • The Case for Building Identity Security into Enterprise UX Design

    The Case for Building Identity Security into Enterprise UX Design

    People expect nothing short of exceptional from their personal tech experiences. Yet these lofty, consumer-driven standards haven’t really applied to work-issued technology until recently. Now...

    Read Article
  • What to Do with Your “Second Chance” at Identity Security Success

    What to Do with Your “Second Chance” at Identity Security Success

    At the start of the pandemic, security decision makers were focused on making remote work feasible — fast. They revamped Identity and Access Management (IAM) strategies, cobbled together what they...

    Read Article
  • loading
    Loading More...