The CyberArk Blog
-
Identity security at inception: A CISO’s guide to proactive protection
Modern enterprises are facing an identity explosion. Fueled by cloud adoption, DevOps acceleration, and now agentic AI, the number of human and machine identities is growing faster than most...
-
CyberArk Named a Leader in the 2024 Gartner® Magic Quadrant™ for Privileged Access Management – again.
View the Report -
Scattered Spider Unmasked: How an identity-focused APT is redefining cyber threats
Scattered Spider has emerged as one of the most disruptive advanced persistent threats in recent years, breaching major organizations across telecom, gaming, transportation, and retail. In the...
-
The quantum-AI collision: What CISOs must do now to stay ahead
Technology is moving at the speed of light, and two forces—quantum computing and AI agents—are poised to shake up cybersecurity. We’re not talking about some far-off future; this is happening now....
-
How agentic AI could transform enterprise workflows: Insights from MIT GenAI Lab
The line between human and machine is blurring—and it’s not a question of whether machines can do more, but how far we’re willing to let them go. The frontier lies in tackling the chaos and...
-
Machine identity mayhem: The volume, variety, velocity challenge
Machine identities—like the API keys, certificates, and access tokens that secure machine-to-machine connections—are swarming businesses. Yet, many teams still reach for manual tools while their...
-
Post-quantum cryptography (PQC): how to build resilience while padlocks still work
This blog is the second part of a two-part series on post-quantum cryptography (PQC). In Part 1, we explored how the Harvest Now, Decrypt Later (HNDL) strategy has moved from crypto-conspiracy...
-
This message will self-decrypt in 5 years: why post-quantum prep starts now
This blog is the first part of a two-part series on post-quantum cryptography (PQC). In this piece, we explore why quantum threats are no longer theoretical. In Part 2, we’ll cover practical steps...
-
The future of identity governance: fast, secure, and scalable
If the mere mention of identity governance and administration (IGA) stresses you out, you’re in good company. Managing digital identities and access privileges is a significant challenge that only...
-
CIO POV: Closing the trust gap in SaaS security
“The modern ‘software as a service’ (SaaS) delivery model is quietly enabling cyber attackers and—as its adoption grows—is creating a substantial vulnerability that is weakening the global...
-
TLS action lead time is closing: 5 practical steps to prepare for 47-day TLS certificates
Have you ever been on a tight deadline, and suddenly, your organization’s core services go dark because a TLS certificate expired without warning? It’s a nightmare scenario no team wants to face....
-
Federal IT Modernization: Balancing Efficiency with Advanced Cybersecurity
As 2025 unfolds, U.S. federal agencies are navigating significant operational shifts that are impacting their overarching cybersecurity strategies. Government security leaders have always...
-
How Poor User Experience (UX) Can Undermine Your Enterprise Security
For years, cybersecurity has been chasing a future where passwords no longer exist. And yet, here we are in 2025—still resetting them, reusing them and getting breached because of them. The...
-
Precision in Machine Identity: Securing the NHIs That Matter
Imagine walking into your next board meeting and saying, “We need to secure all the non-humans.” You can probably picture the reactions: furrowed brows, confused glances—not exactly a solid...
-
Unlocking ROI: Proving the Value of Your Identity Security Program to the C-Suite
Cybersecurity is no longer just a technical concern; it’s a business-critical investment. Yet, gaining the C-suite’s backing often hinges on one essential question: “What’s the ROI?” Proving the...
-
Whole-of-State Cybersecurity: A Unified Approach to Protecting Government
In today’s era, where the digital landscape is as critical as the physical, the urgency to adapt and reinforce our cybersecurity infrastructure is more pressing than ever. For government...
-
TLS Certificate Validity Cut to 47 Days: What You Need to Know
The CA/Browser Forum’s recent unanimous vote to reduce maximum public TLS certificate validity to just 47 days by March 2029 marks a seismic shift in the digital security landscape. This new...
-
The Cybersecurity Investment Most Organizations Are Failing to Secure
Welcome to the 2025 Identity Security Landscape rollout—and to the “it’s complicated” phase of our relationship with AI. Each year, CyberArk surveys security leaders across the globe to understand...
-
Modern Cybersecurity Strategies for Linux Servers
Linux servers have become widely adopted across organizations of all sizes. However, the frustrations of integrating these servers have left organizations struggling to implement strong security...
-
Securing Identities for the Agentic AI Landscape
Twenty-five years ago, we set out to tackle one of the most challenging problems in identity security: Securing privileged access. Today, CyberArk takes another giant step forward, extending our...
-
Proactive Identity Security: Addressing Unmanaged Endpoint Risks
When an electrician comes to fix something in your house, you wouldn’t just hand over the keys and leave. Instead, you’d stay to supervise and ensure everything is done correctly. Similarly,...
-
Loading More...