How external attackers and malicious insiders exploit standing privileges in the cloud
For many of us, the term “cloud security breach” conjures meticulous attack plans executed by sophisticated criminal syndicates. But in reality, “attacks” can be far more mundane: maybe some...
Read Blog
Rethinking secondary accounts: How zero standing privileges (ZSP) reshape identity security
For years, separating day-to-day user activity from administrative tasks through secondary accounts was considered a security best practice. But as identity threats grow more sophisticated and...
Read Blog
CyberArk Secure Cloud Access achieves CSA STAR Level 1 certification
When you hand over the keys to your cloud, you’d better know who’s holding them—and for how long. In a world where speed is everything and complexity is the norm, organizations need more than...
Read Blog
CyberArk earns Wiz partner award for advancing cloud identity innovation
Cloud complexity is growing. So are the risks—and the opportunities. As organizations scale their infrastructure across hybrid environments to innovate quickly, security strategies must evolve...
Read Blog
Developers fly the plane: AI guardrails for secure cloud innovation
Developers now chart courses through environments as dynamic and unpredictable as open skies, plotting efficient courses through shifting clouds of technology to reach ambitious goals....
Read Blog
Enhancing Kubernetes Security: Strategies for Effective Secrets Management
Kubernetes powers modern application deployments, yet safeguarding its secrets remains a formidable challenge. In a 2024 report, IBM estimated that 16% of data breaches stemmed from compromised...
Read Blog