Securing AI agents: privileged machine identities at unprecedented scale
Earlier in 2025, an AI agent named Claudius made headlines when it insisted it was human, promising to deliver products in “a blue blazer and red tie.” Quirky? Sure. But beneath the strange...
Read Blog
AI agents in financial services: The hidden org chart
Do you know who’s really working for your bank, and whether they’re quietly rewriting your org chart behind the scenes? AI agents are quickly becoming “first-class citizens” in financial services,...
Read Blog
When AI agents become admins: Rethinking privileged access in the age of AI
From resetting passwords and approving workflows to pulling HR data and orchestrating cloud infrastructure, AI agents now perform tasks that previously required a human with privileged access. AI...
Read Blog
Sandworm in the supply chain: Lessons from the Shai-Hulud npm attack on developer and machine identities
Do you know why Shai-Hulud should raise your hackles? Unless you’ve spent time on Arrakis in Frank Herbert’s Dune or the npm ecosystem this month, the name Shai-Hulud might not ring a bell. In...
Read Blog
Persuasion engineering: how to influence humans, LLMs, and AI agents
We’ve spent decades treating persuasion like an art—something you could master if you had charisma, practice, or luck. Lawyers use it to hone arguments. Marketers use it to craft taglines. On the...
Read Blog
A practical guide to AI-ready machine identity governance in finance
Across financial services operations, machine identities play critical roles, but in many organizations, these cryptographic keys, API tokens, certificates, and service accounts remain chronically...
Read Blog
The AI revolution in financial cybersecurity
Financial cybersecurity has never been a static discipline. Over two decades in this industry, I’ve seen it transform from a compliance checkbox to a cornerstone of business resilience—usually...
Read Blog
Identity Security: Why Buyers Choose CyberArk
In the world of identity security, organizations evaluating solutions want to understand why CyberArk stands out as the top choice. Leaders aren’t just looking for a rundown of capabilities – they...
Read Blog
Is autofill safe? Clickjacking risks and security tradeoffs explained
When new security research hits the headlines, it often sparks a predictable wave of worry: should we turn off features we rely on? Should we rethink basic workflows? That’s exactly the case with...
Read Blog
6:10
Welcome Address, Thomas Fikentscher, Area Vice President ANZ, CyberArk
Thomas Fikentscher, Area VP ANZ at CyberArk, opens IWT Melbourne 2025, highlighting identity security, innovation, and collaboration, setting the stage for a day of learning and connections.
Watch Video