The CyberArk Blog
-
Defense-in-Depth for Secrets Management: Discovery, Visibility, Leak Detection and AI
In the past, many security teams considered securing secrets enough – if your secrets were secured, you were good. While you’re still kind-of-good staying on this course, security professionals...
-
CyberArk Named a Leader in the 2023 Gartner® Magic Quadrant™ for Privileged Access Management – again.
View the Report -
The Knight in Shining Armor: Identity Security in Manufacturing Cybersecurity
In the throes of the Fourth Industrial Revolution, the manufacturing sector stands at the crossroads of groundbreaking innovation and an ever-growing shadow of cyberthreats. IT modernization has...
-
CIO POV: The Power of Cybersecurity Collaboration
You’ve undoubtedly heard Michael Jordon’s famous quote, “Talent wins games, but teamwork and intelligence win championships.” Jordan’s words encapsulate the fruition of team spirit and strategic...
-
Understanding APIs and How Attackers Abuse Them to Steal Data
Simply put, APIs (short for application programming interface) are how machines, cloud workloads, automation and other non-human entities communicate with one another. They also represent an...
-
Cookies Beyond Browsers: How Session-Based Attacks Are Evolving
In the past few years, we have witnessed a significant shift in the attack landscape, from stealing clear text credentials to targeting session-based authentication. This trend is driven by the...
-
How Secure is Automotive Digital Identity?
In the automotive industry’s fast lane, the fusion of digital innovation with vehicular engineering has revolutionized how we manufacture, drive and protect our vehicles. It also helps to ensure...
-
Election Security: Defending Democracy in Today’s Dynamic Cyber Threat Landscape
With over 50 countries heading to the polls this year, including major economies like the U.S., India and the U.K., 2024, one way or another, will be a defining year with over 4 billion voters...
-
Enterprise Browsers Need to Secure Identities Without Compromise
Now is the time. It’s been over 30 years since the introduction of the first web browser. Since then, the browser has evolved into an application that allows us to stream entertainment, work and...
-
CIO POV: What Makes a Good Neighbor in a Bad Cyber Neighborhood
“It’s discouraging to try to be a good neighbor in a bad neighborhood.” –William Castle This quote from the late American horror film director has recently been running through my head as I think...
-
CyberArk SaaS Solutions Achieve FedRAMP® High Authority
I’m honored to share that CyberArk is FedRAMP® High Authorized and ready to support U.S. federal agencies in securing access to critical government data and systems, meeting Zero Trust mandates...
-
How to Align Your Security Strategy with NIST Cybersecurity Framework 2.0
After a decade in the making – or waiting, as the case may be – the National Institute of Standards and Technology (NIST) has released the first major revision to its Cybersecurity Framework...
-
Why Identity Security Is Essential to Cybersecurity Strategy
In the modern digital landscape, cybersecurity isn’t just a technical challenge – it’s a business imperative. At the heart of cybersecurity is identity security – the principle that the right...
-
Why Your Organization Needs Dynamic Secrets and Rotation
In today’s rapidly evolving digital landscape, organizations confront a formidable array of cyber threats, with attacks and data breaches becoming increasingly prevalent. As businesses embrace...
-
How Time, Entitlements and Approvals (TEA) Can Secure the Keys to Your Cloud
A popular topic of conversation in my day-to-day work is how to secure privileged access to cloud management consoles and workloads. And that’s no surprise, considering more and more applications...
-
Why Machine Identities Are Essential Strands in Your Zero Trust Strategy
Just like a snagged strand can ruin your garment, overlooking the security of machine identities can tear the very fabric of Zero Trust that protects your organization from bad actors. As a quick...
-
Enterprise Browser: The Gateway to Securing All Identities
With new identities, environments and attack methods dominating today’s threat landscape, cybersecurity leaders are hyper-focused on securing identities to safeguard enterprises. However, a...
-
CIO POV: 3 Considerations as the 2024 Cyber Roller Coaster Gathers Speed
If the first month-plus of 2024 is any indication, this year is likely to be anything but ordinary in the cybersecurity realm. In January alone, a triad of events unfolded, each more riveting than...
-
APT29’s Attack on Microsoft: Tracking Cozy Bear’s Footprints
A new and concerning chapter has unfolded in these troubled times of geopolitical chaos. The Cozy Bear threat actor has caused significant breaches targeting Microsoft and HPE, and more are likely...
-
Redefining PAM to Secure OT and IoT Devices
Left to their own devices, your organization’s devices can be a significant source of risk. Consider operational technology (OT), which is crucial for organizations but is not engineered and...
-
Elevating Cloud Security With Well-Architected Practices
It’s said that life truly begins when you step out of your comfort zone. Living in California provides me with many options for hiking and trekking, a perfect backdrop for spending time with...
- Loading More...