The CyberArk Blog

  • How to Map Identity Security Maturity and Elevate Your Strategy

    How to Map Identity Security Maturity and Elevate Your Strategy

    The ultimate goal of Identity Security is to provide secure access to every identity for any resource or environment, from any location, using any device. Yet ever-evolving technology and dynamic...

    Read Article
  • CyberArk Named a Leader in the 2022 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • LTT Attack Targets Session Cookies to Push Crypto Scam

    LTT Attack Targets Session Cookies to Push Crypto Scam

    Crypto scams are skyrocketing: In 2022, the FBI tracked an 183% year-over-year increase, driving $2.57 billion in losses. Last week, the popular YouTube channel Linus Tech Tips (LTT for short) –...

    Read Article
  • Protect Passwords, Don’t Just Manage Them: A Game Plan for CIOs and CISOs

    Protect Passwords, Don’t Just Manage Them: A Game Plan for CIOs and CISOs

    When 921 password attacks occur per second, it’s time to treat everyday employees’ credentials like the true operational risk they are. Today’s attackers assign a level of value to employees’...

    Read Article
  • What Is Zero Trust and Why Is it So Important?

    What Is Zero Trust and Why Is it So Important?

    There are nuances to how Zero Trust security is defined — but at its core, it's a strategic cybersecurity model enabled to protect modern digital business environments.

    Read Article
  • How to Streamline Security Operations With Identity Security Intelligence

    How to Streamline Security Operations With Identity Security Intelligence

    “Black Swan” author Nicholas Nassim Taleb once wrote that “intelligence consists in ignoring things that are irrelevant (avoiding false patterns).” Organizations must take this definition to heart...

    Read Article
  • Secrets Management: Meeting Developers Where They Are

    Secrets Management: Meeting Developers Where They Are

    There’s always a balancing act when it comes to building and deploying cloud-native applications in environments like Amazon Web Services (AWS). The whole point of moving production to the cloud...

    Read Article
  • Why the Phishing Blame Game Misses the Point

    Why the Phishing Blame Game Misses the Point

    Phishing is a big problem that’s getting even bigger as cybercriminals find new ways to hook employees. With threats coming from every direction – emails on company computers, text and voice...

    Read Article
  • How Automated Identity Management Can Help Solve the Compliance Puzzle

    How Automated Identity Management Can Help Solve the Compliance Puzzle

    Have you ever received a puzzle as a gift from a well-intentioned friend? They likely thought something along the lines of, “Hey, this person’s into solving problems — I bet they’d love putting...

    Read Article
  • Deconstructing Identity Security

    Deconstructing Identity Security

    Most companies now recognize the serious and insidious nature of cybersecurity threats. But many fail to grasp that the digital transformation, remote work, automation and cloud migration...

    Read Article
  • Udi Mokady to Step into Executive Chair Role and Matt Cohen to Become CEO

    Udi Mokady to Step into Executive Chair Role and Matt Cohen to Become CEO

    Today, CyberArk announced that our founder and CEO Udi Mokady will step into the role of Executive Chairman and our Chief Operating Officer, Matt Cohen, will become CyberArk’s CEO, effective April...

    Read Article
  • Post-CircleCI Breach, Focus on Identity Security Strategy

    Post-CircleCI Breach, Focus on Identity Security Strategy

    When news of the recent CircleCI breach broke, developers everywhere scrambled to rotate tokens and remove hardcoded secrets stored in the popular CI/CD platform to minimize their exposure. Now...

    Read Article
  • How to Secure Secrets in Multi-cloud Environments

    How to Secure Secrets in Multi-cloud Environments

    It wasn’t too long ago that using a single cloud for some business operations was cutting-edge technology. Now the cloud is essential for accelerating growth, improving efficiency and remaining...

    Read Article
  • Three Ways to Reinforce Least Privilege with Identity Management

    Three Ways to Reinforce Least Privilege with Identity Management

    The definition of privilege is changing, and this changes everything. Identities of all types — not just IT team members, but any employees — are gaining access to sensitive data, infrastructure...

    Read Article
  • Identity Security: Bridging the Executive Confidence/Reality Gap

    Identity Security: Bridging the Executive Confidence/Reality Gap

    In recent years, cybersecurity has become a board-level issue resulting in several executives taking greater responsibility in cybersecurity-related decisions. As a result, the CISO is no longer a...

    Read Article
  • Why No User Should Have Local Admin Rights

    Why No User Should Have Local Admin Rights

    The idea of removing local administrator rights from Every. Single. User. across your organization is likely to spark strong reactions. Search popular online forums for the phrase “remove local...

    Read Article
  • How Identity Security Addresses Key DoD Zero Trust Requirements

    How Identity Security Addresses Key DoD Zero Trust Requirements

    The U.S. Department of Defense (DoD) is going all in on Zero Trust. In late 2022, the Pentagon released its long-anticipated Zero Trust strategy and roadmap for migrating “trusted” perimeter-based...

    Read Article
  • Zero-Days in RGB Keyboards, Top DID Network Exposed at INTENT Threat Research Summit

    Zero-Days in RGB Keyboards, Top DID Network Exposed at INTENT Threat Research Summit

    Data breach headlines are daily reminders that cyberattackers keep innovating. While constant research to uncover threats and share crucial intelligence with defenders is far less visible, the...

    Read Article
  • CircleCI Breach Exposes Risk of Hard-coded Secrets

    CircleCI Breach Exposes Risk of Hard-coded Secrets

    The recent CircleCI breach highlights the risk of storing secrets in places like private code repositories (GitHub), scripts, configuration files, files encrypted at rest, CI/CD pipeline code or...

    Read Article
  • Six Takeaways from Recent Ransomware Attacks

    Six Takeaways from Recent Ransomware Attacks

    2022 ransomware attack learnings can inform 2023 cybersecurity strategies, helping organizations combat threats and reduce risk with greater confidence. The CyberArk 2022 Identity Security Threat...

    Read Article
  • Why Intelligent Privilege Controls Are Essential for Identity Security

    Why Intelligent Privilege Controls Are Essential for Identity Security

     “If we can control identity, we can stop most modern attacks. And if you control identity, then you control every perimeter, application, container – effectively every part of the environment.” –...

    Read Article
  • loading
    Loading More...