The CyberArk Blog

  • How to Secure Secrets in Multi-cloud Environments

    How to Secure Secrets in Multi-cloud Environments

    It wasn’t too long ago that using a single cloud for some business operations was cutting-edge technology. Now the cloud is essential for accelerating growth, improving efficiency and remaining...

    Read Article
  • CyberArk Named a Leader in the 2022 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • Three Ways to Reinforce Least Privilege with Identity Management

    Three Ways to Reinforce Least Privilege with Identity Management

    The definition of privilege is changing, and this changes everything. Identities of all types — not just IT team members, but any employees — are gaining access to sensitive data, infrastructure...

    Read Article
  • Identity Security: Bridging the Executive Confidence/Reality Gap

    Identity Security: Bridging the Executive Confidence/Reality Gap

    In recent years, cybersecurity has become a board-level issue resulting in several executives taking greater responsibility in cybersecurity-related decisions. As a result, the CISO is no longer a...

    Read Article
  • Why No User Should Have Local Admin Rights

    Why No User Should Have Local Admin Rights

    The idea of removing local administrator rights from Every. Single. User. across your organization is likely to spark strong reactions. Search popular online forums for the phrase “remove local...

    Read Article
  • How Identity Security Addresses Key DoD Zero Trust Requirements

    How Identity Security Addresses Key DoD Zero Trust Requirements

    The U.S. Department of Defense (DoD) is going all in on Zero Trust. In late 2022, the Pentagon released its long-anticipated Zero Trust strategy and roadmap for migrating “trusted” perimeter-based...

    Read Article
  • Zero-Days in RGB Keyboards, Top DID Network Exposed at INTENT Threat Research Summit

    Zero-Days in RGB Keyboards, Top DID Network Exposed at INTENT Threat Research Summit

    Data breach headlines are daily reminders that cyberattackers keep innovating. While constant research to uncover threats and share crucial intelligence with defenders is far less visible, the...

    Read Article
  • CircleCI Breach Exposes Risk of Hard-coded Secrets

    CircleCI Breach Exposes Risk of Hard-coded Secrets

    The recent CircleCI breach highlights the risk of storing secrets in places like private code repositories (GitHub), scripts, configuration files, files encrypted at rest, CI/CD pipeline code or...

    Read Article
  • Six Takeaways from Recent Ransomware Attacks

    Six Takeaways from Recent Ransomware Attacks

    2022 ransomware attack learnings can inform 2023 cybersecurity strategies, helping organizations combat threats and reduce risk with greater confidence. The CyberArk 2022 Identity Security Threat...

    Read Article
  • Why Intelligent Privilege Controls Are Essential for Identity Security

    Why Intelligent Privilege Controls Are Essential for Identity Security

     “If we can control identity, we can stop most modern attacks. And if you control identity, then you control every perimeter, application, container – effectively every part of the environment.” –...

    Read Article
  • CyberArk Labs’ 2022 Threat Research in Review

    CyberArk Labs’ 2022 Threat Research in Review

    Cyber defenders need timely, accurate threat intelligence to protect their organizations. This is what drives our CyberArk Labs team to produce innovative research, expose new attack methods and...

    Read Article
  • Trust Issues Podcast: A 2022 Cyber Episodes Replay

    Trust Issues Podcast: A 2022 Cyber Episodes Replay

    Since launching last spring, the CyberArk Trust Issues Podcast has covered a range of top-of-mind cybersecurity subjects. Whether you’re interested in CISO perspectives, cutting-edge threat...

    Read Article
  • Revisiting Major 2022 Breaches and Cybersecurity Events

    Revisiting Major 2022 Breaches and Cybersecurity Events

    Before we ring in the new year, we’re reflecting on some of the biggest cybersecurity events of 2022. It’s been a stressful 12 months for security teams, to say the least. Many open cybersecurity...

    Read Article
  • 2023 Cybersecurity Trends We’re Tracking

    2023 Cybersecurity Trends We’re Tracking

    Cybersecurity doesn’t happen in a vacuum. Evolving attack trends, world events, regulatory changes, shifting organizational priorities and many other factors influence enterprise programs. With...

    Read Article
  • Latest Uber Breach Underscores Third-Party Vendor Security Challenges

    Latest Uber Breach Underscores Third-Party Vendor Security Challenges

    Uber is back in the spotlight, this time for a breach involving a third-party vendor. According to reports, an attacker accessed the vendor organization’s public cloud backup server, obtaining and...

    Read Article
  • An Identity Security Approach to NIS2 Readiness

    An Identity Security Approach to NIS2 Readiness

    With its new and improved Network and Information Security Directive, NIS2, the European Union joins a growing list of governments around the world that are enacting stronger cybersecurity...

    Read Article
  • NIS2 to Boost Cybersecurity Requirements for Many EU Businesses  

    NIS2 to Boost Cybersecurity Requirements for Many EU Businesses  

    On November 28, 2022, NIS2 officially replaced the European Union’s Network and Information Security (NIS) Directive, heralding significant compliance changes for many EU businesses. This...

    Read Article
  • Cloud Migration On Your Identity Security Terms

    Cloud Migration On Your Identity Security Terms

    The public cloud is empowering organizations to do incredible things, from exploring new realms in space to transforming cultures. This week at AWS re:Invent in Las Vegas, these real-world cloud...

    Read Article
  • How the IoT Intensifies Software Supply Chain Risks

    How the IoT Intensifies Software Supply Chain Risks

    The world of Internet of Things (IoT) devices is both fanciful and ubiquitous, from routers and smart appliances popular at home to intelligent building systems and self-monitoring industrial...

    Read Article
  • Meet PCI DSS Compliance and Protect Cardholder Data with PAM Controls

    Meet PCI DSS Compliance and Protect Cardholder Data with PAM Controls

    The 2022 holiday online shopping season is shaping up to be a busy one. An estimated 63.9 million people will shop this Cyber Monday, while global eCommerce transactions are expected to climb 15%...

    Read Article
  • 2023 Cybersecurity Predictions from CyberArk Labs

    2023 Cybersecurity Predictions from CyberArk Labs

    It’s been an eventful 2022 and, based on what our CyberArk Labs team is observing, 2023 will introduce yet another chapter of cybersecurity threats and challenges, along with some new...

    Read Article
  • loading
    Loading More...